Sourcefire VRT Certified Snort Rules Update for 02/11/2014
We welcome the introduction of the newest rule release from the VRT. In this release we introduced 110 new rules and made modifications to 44 additional rules.
There were no changes made to the
snort.conf
in this release.
The VRT would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:
Avery Tarasov:
29664
29665
In VRT's rule release:
Microsoft Security Bulletin MS14-005:
Programming errors exist in Microsoft XML Core Services (MSXML) that
could lead to information disclosure.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 29680 through 29705.
Microsoft Security Bulletin MS14-006:
A coding deficiency in IPv6 could lead to a Denial of Service (DoS).
Previously released rules will detect attacks targeting this
vulnerability and have been updated with the appropriate reference
information. They are included in this release and are identified with
GID 1, SIDs 23178 and 24296.
Microsoft Security Bulletin MS14-007:
A coding deficiency exists in Direct2D that may lead to remote code
execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 29713 through 29714.
Microsoft Security Bulletin MS14-009:
Programming errors in the .NET Framework may lead to an escalation of
privilege.
A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 29715.
Microsoft Security Bulletin MS14-010:
Internet Explorer suffers from programming errors that may lead to
remote code execution.
Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 29655, 29667 through
29668, 29671 through 29674, 29676 through 29679, 29706 through 29712,
29716 through 29722, 29727 through 29738, and 29741 through 29744.
Microsoft Security Bulletin MS14-011:
A coding deficiency exists in the VBScript Scripting Engine that may
lead to remote code execution.
A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 29675.
The Sourcefire VRT has also added and modified multiple rules in the
blacklist, browser-ie, browser-plugins, exploit-kit, file-flash,
file-multimedia, file-office, file-other, file-pdf, malware-cnc,
malware-other, protocol-icmp, server-apache, server-iis and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.
In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!