Snort mailing list archives

Snort Subscriber Rules Update 2015-06-09


From: Research <research () sourcefire com>
Date: Tue, 9 Jun 2015 18:07:57 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Security Bulletin MS15-056:
Microsoft Internet Explorer suffers from programming errors that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 31284, 31286, 32262
through 32263, 34721 through 34730, 34733 through 34736, 34745 through
34760, 34763 through 34768, 34772 through 34773, 34778 through 34779,
and 34790 through 34791.

Microsoft Security Bulletin MS15-057:
A coding deficiency exists in Microsoft Windows Media Player that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 34731 through 34732.

Microsoft Security Bulletin MS15-059:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Previously released rules will detect attacks targeting this
vulnerability and have been updated with the appropriate reference
information. They are included in this release and are identified with
GID 1, SIDs 18494 through 18945.

New rules to detect attacks targeting these vulnerabilities are also
included in this release and are identified with GID 1, SIDs 34737
through 34740, and 34743 through 34744.

Microsoft Security Bulletin MS15-061:
Microsoft Windows Kernel suffers from programming errors that may lead
to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 34761 through 34762,
34770 through 34771, 34774 through 34777, and 34780 through 34789.

Microsoft Security Bulletin MS15-062:
A coding deficiency exists in Microsoft Active Directory Federation
Services that may lead to an escalation of privilege.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 34769.


Talos has also added and modified multiple rules in the browser-ie,
browser-plugins, deleted, file-flash, file-office, file-other,
os-windows, protocol-voip and server-webapp rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFVdyt9s9U0LCYEKaARAg/hAJ9XOoOuzEJocvLdJ0B7BSV/9g90PgCfd+uv
vtm8+spsDiymNMHsmEmW6+c=
=YJDN
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!


Current thread: