Snort mailing list archives

Sourcefire VRT Certified Snort Rules Update 2014-03-11


From: Research <research () sourcefire com>
Date: Tue, 11 Mar 2014 15:16:02 -0400 (EDT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft Corporation.

Details:
Microsoft Security Bulletin MS14-012:
Microsoft Internet Explorer contains programming errors that may allow
a remote attacker to execute code on a vulnerable system.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 29717 through 29718,
29819 through 29820, 30106 through 30132, and 30140 through 30145.

The Sourcefire VRT has also added and modified multiple rules in the
blacklist, browser-ie, browser-plugins, deleted, exploit-kit,
file-flash, file-identify, file-multimedia, file-other, malware-cnc,
malware-other, protocol-icmp and server-webapp rule sets to provide
coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2014-03-11.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFTH2D1QLjqI2QiHVMRAm8UAKCnyZextXM4ZkUtxBUkJCRvDMXxwwCfSjBS
cakOmqpmbYR3WR2C0R/y0O0=
=IM4m
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
Learn Graph Databases - Download FREE O'Reilly Book
"Graph Databases" is the definitive new guide to graph databases and their
applications. Written by three acclaimed leaders in the field,
this first edition is now available. Download your free book today!
http://p.sf.net/sfu/13534_NeoTech
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: