Snort mailing list archives

Snort Subscriber Rules Update 2019-09-10


From: Research <research () sourcefire com>
Date: Tue, 10 Sep 2019 17:07:35 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2019-0787:
A coding deficiency exists in Remote Desktop Protocol Client that may
lead to remote code execution.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 51481.

Microsoft Vulnerability CVE-2019-0788:
A coding deficiency exists in Remote Desktop Protocol Client that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51482 through 51483.

Microsoft Vulnerability CVE-2019-1214:
A coding deficiency exists in Microsoft Windows Common Log File System
(CLFS) driver that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51436 through 51437.

Microsoft Vulnerability CVE-2019-1215:
A coding deficiency exists in Microsoft Windows that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51445 through 51446.

Microsoft Vulnerability CVE-2019-1216:
A coding deficiency exists in DirectX that may lead to information
disclosure.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51449 through 51450.

Microsoft Vulnerability CVE-2019-1219:
A coding deficiency exists in Microsoft Windows Common Log File System
(CLFS) driver that may lead to information disclosure.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51451 through 51452.

Microsoft Vulnerability CVE-2019-1256:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51463 through 51464.

Microsoft Vulnerability CVE-2019-1257:
A coding deficiency exists in Microsoft SharePoint that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51474 through 51475.

Microsoft Vulnerability CVE-2019-1284:
A coding deficiency exists in DirectX that may lead to an escalation of
privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51456 through 51457.

Microsoft Vulnerability CVE-2019-1285:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51454 through 51455.

Microsoft Vulnerability CVE-2019-1295:
A coding deficiency exists in Microsoft SharePoint that may lead to
remote code execution.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 1, SID 51438.

Microsoft Vulnerability CVE-2019-1296:
A coding deficiency exists in Microsoft SharePoint that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 51479 through 51480.


Talos also has added and modified multiple rules in the browser-chrome,
browser-firefox, browser-ie, file-executable, file-image, file-office,
file-other, malware-backdoor, os-windows, policy-other, protocol-dns,
protocol-other, protocol-scada, server-iis and server-webapp rule sets
to provide coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=p4Pw
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: