(Sorry for the late post, this was released yesterday!
We welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 45 new rules and made modifications to 26 additional rules.
There were no changes made to the
snort.conf
in this release.
The VRT would like to thank Avery Tarasov for his contribution of rules:
26335
26370
26371
In VRT's rule release:
Details: Microsoft Security Bulletin MS13-029:
Microsoft Remote Desktop Client contains programming errors that may allow a remote attacker to execute code on a vulnerable system. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 26355 through 26365.
Microsoft Security Bulletin MS13-032: A vulnerability in Microsoft Active Directory could lead to a denial of service. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SID 26354.
Additionally, the Sourcefire VRT has added and modified multiple rules in the bad-traffic, blacklist, browser-ie, browser-plugins, dos, exploit-kit, file-other, indicator-compromise, indicator-obfuscation, malware-cnc, malware-other, netbios, os-windows, protocol-ftp and server-webapp rule sets to provide coverage for emerging threats from these technologies.
In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!