Tuesday, May 13, 2014

Sourcefire VRT Certified Snort Rules Update for 05/13/2014, MSTuesday

Just released:
Sourcefire VRT Certified Snort Rules Update for 05/13/2014

We welcome the introduction of the newest rule release from the VRT. In this release we introduced 21 new rules and made modifications to 14 additional rules.

There were no changes made to the snort.conf in this release.

The VRT would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Avery Tarasov
30949

In VRT's rule release:
Microsoft Security Bulletin MS14-022:
A coding deficiency exists in Microsoft SharePoint that may lead to
remote code execution.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 30951.

Microsoft Security Bulletin MS14-029:
Internet Explorer suffers from programming errors that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 30956 through 30957
and 30961 through 30964.

The Sourcefire VRT has also added and modified multiple rules in the
blacklist, browser-ie, browser-other, dos, exploit-kit,
file-multimedia, malware-backdoor, malware-cnc, malware-other,
server-apache, server-mail and server-webapp rule sets to provide
coverage for emerging threats from these technologies.


In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!