Friday, February 3, 2017

Snort Subscriber Rule Set Update for 02/02/2017, WordPress Vulnerability, Microsoft 0day in SMB

Just released:
Snort Subscriber Rule Set Update for 02/02/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 14 new rules and made modifications to 7 additional rules.

There were no changes made to the snort.conf in this release.

Talos would like to thank the following individuals for their contributions, their rules are included in the Community Ruleset:

Yaser Mansour
41498


Talos's rule release:
CVE-2017-0016: A coding deficiency exists in Microsoft Windows SMB that may lead to remote code execution. 
A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 41499. 
This release also provides detection for a WordPress vulnerability using a authentication bypass.  This is the bug that was patched recently via a silent fix, and is particularly nasty.  Please upgrade your WordPress installation immediately if you have not done so.  As WordPress is so widely deployed, and the vulnerability is rather simple, we have placed these rules in the community ruleset for everyone's use.
Talos has also added and modified multiple rules in the browser-ie, browser-plugins, malware-cnc, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!