Tuesday, June 27, 2017

Snort Subscriber Rule Set Update for 06/27/2017

Just released:
Snort Subscriber Rule Set Update for 06/27/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 78 new rules of which 0 are Shared Object rules and made modifications to 26 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the browser-firefox, browser-ie, browser-plugins, browser-webkit, exploit-kit, file-flash, file-image, file-multimedia, file-office, file-other, file-pdf, malware-cnc, os-windows, policy-other, protocol-scada, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies.

In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Thursday, June 22, 2017

Snort Subscriber Rule Set Update for 06/22/2017

Just released:
Snort Subscriber Rule Set Update for 06/22/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 43 new rules of which 1 are Shared Object rules and made modifications to 11 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the browser-ie, browser-plugins, browser-webkit, file-flash, file-image, file-multimedia, file-other, indicator-obfuscation, indicator-shellcode, malware-cnc, os-windows, protocol-ftp, protocol-scada, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Wednesday, June 21, 2017

Snort OpenAppID Detectors have been updated!

An update has been released today for the Snort OpenAppID Detector content. This release, build 283, includes
  • A total of 2,836 detectors. 
  • It also includes some additional detectors that came in from the open source community. For more details on which contributions were included, we have added them in the AUTHORS file in this package.

Available now for download from our downloads page, we look forward to you downloading and using the new features of 2.9.9.0's OpenAppID preprocessor and sharing your experiences with the community.

The OpenAppID community has a mailing list specifically dedicated to the exchange and discussion of detector content.  Please visit the mailing lists page to sign up.

Tuesday, June 20, 2017

Snort Subscriber Rule Set Update for 06/20/2017

Just released:
Snort Subscriber Rule Set Update for 06/20/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 43 new rules of which 5 are Shared Object rules and made modifications to 22 additional rules of which 10 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the blacklist, exploit-kit, file-image, file-other, file-pdf, indicator-obfuscation, malware-cnc, malware-other, os-windows, protocol-scada, pua-adware and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Thursday, June 15, 2017

Snort Subscriber Rule Set Update for 06/15/2017

Just released:
Snort Subscriber Rule Set Update for 06/15/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 16 new rules of which 1 are Shared Object rules and made modifications to 6 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos has added and modified multiple rules in the browser-plugins, exploit-kit, file-flash, file-office, file-other, malware-cnc, os-solaris, protocol-rpc and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Snort++ Update

Pushed build 236 to github (snortadmin/snort3):
  • appid: clean up shutdown stats
  • appid: fix memory leak
  • conf: update defaults
  • decode: updated ipv6 valid next headers
  • detection: avoid superfluous leaf nodes in detection option trees
  • http_inspect: improved handling of badly terminated chunks
  • http_inspect: improved transfer-encoding header processing
  • ips options: add validation for range check types such as dsize
  • perf_monitor: add more tcp and udp peg counts
  • perf_monitor: update cpu tracker output to thread_#.cpu_*
  • port_scan: alert on all scan attempts so blocking is possible
  • port_scan: make fully configurable
  • sip: fix get body buffer for fast patterns
  • ssl: use stop-and-wait splitter (protocol aware splitter is next)
  • stream_ip: fix 123:7

Tuesday, June 13, 2017

Snort Subscriber Rule Set Update for 06/13/2017

Just released:
Snort Subscriber Rule Set Update for 06/13/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 28 new rules of which 3 are Shared Object rules and made modifications to 8 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.



Talos's rule release:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2017-0215:
A coding deficiency exists in Microsoft Device Guard Code Integrity
Policy that may lead to a security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43157 through 43158.

Microsoft Vulnerability CVE-2017-8464:
A coding deficiency exists in Microsoft LNK that may lead to remote
code execution.

Previously released rules will detect attacks targeting these
vulnerabilities and have been updated with the appropriate reference
information. They are also included in this release and are identified
with GID 1, SIDs 17042 and 24500.

Microsoft Vulnerability CVE-2017-8465:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43173 through 43174.

Microsoft Vulnerability CVE-2017-8466:
A coding deficiency exists in Microsoft Windows Cursor that may lead to
an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43173 through 43174.

Microsoft Vulnerability CVE-2017-8468:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43173 through 43174.

Microsoft Vulnerability CVE-2017-8496:
Microsoft Edge suffers from programming errors that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43165 through 43166.

Microsoft Vulnerability CVE-2017-8497:
Microsoft Edge suffers from programming errors that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43169 through 43170.

Microsoft Vulnerability CVE-2017-8509:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43159 through 43160.

Microsoft Vulnerability CVE-2017-8510:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43171 through 43172.

Microsoft Vulnerability CVE-2017-8524:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43163 through 43164.

Microsoft Vulnerability CVE-2017-8529:
Microsoft Edge and Microsoft Internet Explorer suffer from programming
errors that may lead to information disclosure.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43161 through 43162.

Microsoft Vulnerability CVE-2017-8543:
A coding deficiency exists in Microsoft Windows Search that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43175 through 43176.

Microsoft Vulnerability CVE-2017-8547:
Microsoft Internet Explorer suffers from programming errors that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43155 through 43156.

Talos has also added and modified multiple rules in the blacklist,
browser-ie, file-office, file-other, file-pdf, malware-cnc, os-windows,
policy-other, protocol-scada and server-webapp rule sets to provide
coverage for emerging threats from these technologies.



In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

New Snort Mailing Lists are alive!

This evening, if you are a member of the Snort Mailing lists (-users, -sigs, -devel, and/or -openappid) you should have received a welcome message to the new version of the respective list, at its new home on the new server.

You can see the list of Snort lists and of course join (if you are not already a member) here:

https://lists.snort.org/mailman/listinfo

All settings to the lists should be the same, and all users have been (or are being as I type this) migrated from the old lists on Sourceforge, to the new lists.

Effective immediately, I have set the moderation flag on the Sourceforge mailing lists, and all further email to those lists will be rejected with a message to post to the new list.  After an indeterminate period of time, I will decommission the old lists.

I am working with Sourceforge to get a dump of our archives, so we may retain that history on our servers, in the meantime you can find the archives for the mailing lists on Marc.  All emails on the new list will also be archived on Marc.

Hopefully everything went well, and I haven't inconvenienced too many people.  I sincerely apologize if I did.  I had been planning to move off of Sourceforge for years, and hadn't simply because of the history we had built there.  However, with their recent changes in policy, moving the lists at this time made sense.

Any feedback about the move, please contact me at: snort-users@lists.snort.org.

We look forward to seeing everyone on our new server, which is not only on an updated version of the mailman software, but also now without Sourceforge's ads at the bottom of every post!

Thanks for your patience and understanding.

Friday, June 9, 2017

Sourceforge Hosted Snort Mailing Lists

All—

Some recent changes from Sourceforge (where the Snort mailing lists have been hosted since the start of the project, nearly 20 years ago) to their Mailman infrastructure has left us unable to access the member list. Which means we can no longer unsubscribe, subscribe, ban, moderate, clear, or otherwise have any control over the subscribers of the mailing list. Something that as a community manager, prevents me from managing… the community…

The changes outlined here: https://sourceforge.net/blog/sourceforge-project-e-mail-policy-update/ put quite a hinderance on the ability to manage the lists, and therefore, we are looking into options of moving off of Sourceforge.

More news will come soon.

Snort Subscriber Rule Set Update for 06/08/2017

Just released:
Snort Subscriber Rule Set Update for 06/08/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 27 new rules of which 3 are Shared Object rules and made modifications to 5 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
Talos has added and modified multiple rules in the app-detect, browser-ie, file-other, indicator-compromise, malware-cnc, policy-other, protocol-scada, protocol-voip and server-webapp rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!

Monday, June 5, 2017

Snort++ Update

Pushed build 235 to github (snortadmin/snort3):
  • http_inspect: improve handling of improper bare \r separator
  • appid: fix bug where TNS detector corrupted the flow data object
  • search_engine: set range for max_queue_events parameter
    thanks to Navdeep.Uniyal@neclab.eu for reporting the issue
  • arp_spoof: reject non-ethernet packets
  • stream_ip: remove dead code and tweak formatting
  • ipproto: remove unreachable code
  • control_mgmt: add support for daq module reload
  • control_mgmt: add support for unix sockets
  • doc: update default manuals
  • doc: update differences section
  • doc: update README

Thursday, June 1, 2017

Snort Subscriber Rule Set Update for 06/01/2017

Just released:
Snort Subscriber Rule Set Update for 06/01/2017


We welcome the introduction of the newest rule release from Talos. In this release we introduced 16 new rules of which 1 are Shared Object rules and made modifications to 50 additional rules of which 0 are Shared Object rules.

There were no changes made to the snort.conf in this release.

Talos's rule release:
Talos has added and modified multiple rules in the browser-ie, file-flash, file-multimedia, file-office, file-other, indicator-compromise, os-windows, protocol-dns, protocol-imap, server-other and sql rule sets to provide coverage for emerging threats from these technologies.


In order to subscribe now to Talos's newest rule detection functionality, you can subscribe for as low as $29 US dollars a year for personal users, be sure and see our business pricing as well at https://snort.org/products#rule_subscriptions. Make sure and stay up to date to catch the most emerging threats!