Thursday, June 5, 2014

Sourcefire VRT Certified Snort Rules Update for 06/05/2014 -- GnuTLS

Just released:
Sourcefire VRT Certified Snort Rules Update for 06/05/2014


We welcome the introduction of the newest rule release from the VRT. In this release we introduced 6 new rules and made modifications to 0 additional rules.

There were no changes made to the snort.conf in this release.

In VRT's rule release:
Synopsis: 
The Sourcefire VRT is aware of vulnerabilities affecting GnuTLS and OpenSSL. 
Details: 
GnuTLS Heap Overflow CVE-2014-3466: A programming error in GnuTLS exists that may lead to remote code execution. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, 31176 through 31179. 
OpenSSL DTLS Recursion Flaw CVE-2014-0221: A coding deficiency in OpenSSL exists that may lead to a Denial of Service (DoS) attack. Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 1, 31180 through 31181.

In order to subscribe now to the VRT's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at http://www.snort.org/store. Make sure and stay up to date to catch the most emerging threats!