Snort mailing list archives

Snort.org Blog: Sourcefire VRT Certified Snort Rules Update for 10/31/2013


From: Joel Esler <jesler () sourcefire com>
Date: Thu, 31 Oct 2013 16:10:14 -0400


http://blog.snort.org/2013/10/sourcefire-vrt-certified-snort-rules_31.html

Sourcefire VRT Certified Snort Rules Update for 10/31/2013


We welcome the introduction of the newest rule release for today from the VRT. In this release we introduced 27 new 
rules and made modifications to 7 additional rules. 

There were three changes made to the snort.conf in this release:

The following ports were added to HTTP_PORTS, http_inspect ports, and Stream5's tcp (both) sections: 

51423
44440
33330
15489

The Snort.confs on the example page have been updated:
http://www.snort.org/vrt/snort-conf-configurations/

--
Joel Esler
AEGIS Intelligence Lead
OpenSource Community Manager
Vulnerability Research Team, Sourcefire

------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!

Current thread: