Snort mailing list archives
Snort Subscriber Rules Update 2015-06-09
From: Research <research () sourcefire com>
Date: Tue, 9 Jun 2015 18:07:57 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Security Bulletin MS15-056: Microsoft Internet Explorer suffers from programming errors that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 31284, 31286, 32262 through 32263, 34721 through 34730, 34733 through 34736, 34745 through 34760, 34763 through 34768, 34772 through 34773, 34778 through 34779, and 34790 through 34791. Microsoft Security Bulletin MS15-057: A coding deficiency exists in Microsoft Windows Media Player that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 34731 through 34732. Microsoft Security Bulletin MS15-059: A coding deficiency exists in Microsoft Office that may lead to remote code execution. Previously released rules will detect attacks targeting this vulnerability and have been updated with the appropriate reference information. They are included in this release and are identified with GID 1, SIDs 18494 through 18945. New rules to detect attacks targeting these vulnerabilities are also included in this release and are identified with GID 1, SIDs 34737 through 34740, and 34743 through 34744. Microsoft Security Bulletin MS15-061: Microsoft Windows Kernel suffers from programming errors that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 34761 through 34762, 34770 through 34771, 34774 through 34777, and 34780 through 34789. Microsoft Security Bulletin MS15-062: A coding deficiency exists in Microsoft Active Directory Federation Services that may lead to an escalation of privilege. A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 34769. Talos has also added and modified multiple rules in the browser-ie, browser-plugins, deleted, file-flash, file-office, file-other, os-windows, protocol-voip and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) iD8DBQFVdyt9s9U0LCYEKaARAg/hAJ9XOoOuzEJocvLdJ0B7BSV/9g90PgCfd+uv vtm8+spsDiymNMHsmEmW6+c= =YJDN -----END PGP SIGNATURE----- ------------------------------------------------------------------------------ _______________________________________________ Snort-sigs mailing list Snort-sigs () lists sourceforge net https://lists.sourceforge.net/lists/listinfo/snort-sigs http://www.snort.org Please visit http://blog.snort.org for the latest news about Snort!
Current thread:
- Snort Subscriber Rules Update 2015-06-09 Research (Jun 09)