Tuesday, July 10, 2012

Sourcefire VRT Certified Snort Rules Update for 07/10/2012, Microsoft Tuesday

Just released:
Sourcefire VRT Certified Snort Rules Update for 07/10/2012


We welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 54 new rules and made modifications to 27 additional rules.

There were no changes made to the snort.conf in this release.

In VRT's rule release:
Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft Corporation.

Details:
Microsoft Security Bulletin MS12-043:
Microsoft Internet Explorer contains programming errors that may allow
a remote attacker to execute code on a vulnerable system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 23142 through 23146
and 23286 through 23304.

Microsoft Security Bulletin MS12-044:
Microsoft Internet Explorer suffers from a programming error that may
allow a remote attacker to execute code or cause a Denial of Service
(DoS) on a vulnerable system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 23278.

Microsoft Security Bulletin MS12-045:
Microsoft Internet Explorer contains a programming error that may allow
a remote attacker to execute code on an affected system with the
privilege of the current user.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 23280.

Microsoft Security Bulletin MS12-046:
Microsoft Word suffers from a programming error that may allow a remote
attacker to execute code on a vulnerable system.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 23315 and 23316.

Microsoft Security Bulletin MS12-048:
A vulnerability exists in the way that Microsoft Windows systems
attempt to open certain file types that may allow a remote attacker to
execute code on a vulnerable system.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 23314.

Microsoft Security Bulletin MS12-050:
Microsoft SharePoint contains a programming error that may allow a
remote attacker to execute a cross-site scripting attack against a
client.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 23279, 23281 and
23282.

Previously released rules identified with GID 1, SIDs 23136 and 23137
will also detect attacks targeting this vulnerability.

Additionally, the Sourcefire VRT has added and modified multiple rules
in the botnet-cnc, dos, file-identify, file-office, file-other,
file-pdf, netbios, specific-threats, web-activex and web-misc rule sets
to provide coverage for emerging threats from these technologies.



In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!