Tuesday, August 13, 2013

Sourcefire VRT Certified Snort Rules Update for 08/13/2013, MSTuesday

Just released:
Sourcefire VRT Certified Snort Rules Update for 08/13/2013

We welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 31 new rules and made modifications to 12 additional rules.

There were no changes made to the snort.conf in this release.

The VRT would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Nathan Fowler:
27594
27595

Avery Tarasov:
27596

James Lay:
27599

In VRT's rule release:
Microsoft Security Advisory MS13-059:
Internet Explorer suffers from programming errors that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 27605 through 27608,
27612 through 27616, and 27620.

Microsoft Security Advisory MS13-060:
A coding error exists in the Unicode Scripts Processor that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 27618 and 27619.

Microsoft Security Advisory MS13-064:
A coding error in Direct Access Server could lead to a Denial of
Service attack.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 27610 and 27611.

Microsoft Security Advisory MS13-065:
A coding error in ICMPv6 could lead to a Denial of Service attack.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 27624.

Microsoft Security Advisory MS13-066:
A coding error exists in Active Directory Federation Services that may
lead to information disclosure.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 27609.

The Sourcefire VRT has also added and modified multiple rules in the app-detect, browser-ie, browser-plugins, dos, exploit-kit, file-java, file-office, file-other, malware-cnc, malware-other, os-windows, policy-other, policy-spam, protocol-icmp, protocol-imap, server-other and web-client rule sets to provide coverage for emerging threats from these technologies.

In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!