Snort mailing list archives
Snort Subscriber Rules Update 2018-03-13
From: Research <research () sourcefire com>
Date: Tue, 13 Mar 2018 19:19:11 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2018-0817: A coding deficiency exists in Microsoft Windows GDI that may lead to elevation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45881 through 45882. Microsoft Vulnerability CVE-2018-0872: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Previously released rules will detect attacks targeting these vulnerabilities and have been updated with the appropriate reference information. They are also included in this release and are identified with GID 1, SIDs 42749 through 42750. Microsoft Vulnerability CVE-2018-0874: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45875 through 45876. Microsoft Vulnerability CVE-2018-0877: A coding deficiency exists in Microsoft Windows Desktop Bridge VFS that may lead to elevation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45873 through 45874. Microsoft Vulnerability CVE-2018-0880: A coding deficiency exists in Microsoft Windows Desktop Bridge that may lead to elevation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45902 through 45903. Microsoft Vulnerability CVE-2018-0882: A coding deficiency exists in Microsoft Windows Desktop Bridge that may lead to elevation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45900 through 45901. Microsoft Vulnerability CVE-2018-0883: A coding deficiency exists in Microsoft Shell that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45892 through 45895. Microsoft Vulnerability CVE-2018-0889: A coding deficiency exists in Microsoft Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45887 through 45888. Microsoft Vulnerability CVE-2018-0893: A coding deficiency exists in Microsoft Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45898 through 45899. Microsoft Vulnerability CVE-2018-0903: A coding deficiency exists in Microsoft Access that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45883 through 45884. Microsoft Vulnerability CVE-2018-0922: A coding deficiency exists in Microsoft Office that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45879 through 45880. Microsoft Vulnerability CVE-2018-0930: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45889 through 45890. Microsoft Vulnerability CVE-2018-0933: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Previously released rules will detect attacks targeting these vulnerabilities and have been updated with the appropriate reference information. They are also included in this release and are identified with GID 1, SIDs 45378 through 45379 and 45628 through 45629. Microsoft Vulnerability CVE-2018-0934: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Previously released rules will detect attacks targeting these vulnerabilities and have been updated with the appropriate reference information. They are also included in this release and are identified with GID 1, SIDs 45628 through 45629. Microsoft Vulnerability CVE-2018-0935: A coding deficiency exists in Microsoft Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 45877 through 45878. Talos also has added and modified multiple rules in the browser-ie, deleted, exploit-kit, file-executable, file-office, file-other, indicator-compromise, malware-backdoor, malware-cnc, os-windows, protocol-dns, protocol-scada and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJaqCQtAAoJEPE/nha8pb+tXMcP+wbqznDaMoUnhIA7SgEuxsdo e+xhcxxwwfwdixQ3d/5ZSh4o8/f1t6AP29co/VChNFW/vqhVLHliq6O5tQwEFBx+ b1DhP4C07D2744BnyKFxhZdd7IhauSN2416EBTRW5/d6VqiKzXRZHvKDJH/mQRW6 2ylhhZewn1BC8qJWsV9Z2ZZmrbxOSys5BMN9DAqaxrKj9C6wdt3XWGvyedePSWzi AmSWd68C0/itK7Fs5MKW0k1R8+hCVb7vU3JuarCHmufcx4hH7NUbCQQcI7Bnq1Tx 5toDzfO2W4ttPnwr3jy8gyhdvEa3W+stMC4WIdv4ecDdAARGU4zSzwptkKhf+azv ZRDIxis34hYmR6B3i7GHSprdOGvqZgsGvmx5cu94CmVvsaBtrvBcvUe9grj2zTro kvJIb43IVxQHS3kuYXVWzchadszjimBUrWykb6Hhwt/MnYQFsbhoa6zEg5frr9A7 tBvikb7Z5w68Woj1W2KuW6DkES9QuYR/eZJNe59+z/S3WqbxyRAMNyEwnUpthnu/ CgNoXFCwufYjomFUytrNzZPYDYSKTMEJmgK2lqnqifrHBfZ25mrOf1/wJvq9SPG0 rhjR+IGA1Q8f/CckyZsjjS9fKS0BzWjFOL4PizNNEsSbLwxyXRUDkJUIcrd5p4J9 2WMrD5hwaBoBKAAxrcq8 =TjBe -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2018-03-13 Research (Mar 13)