Snort mailing list archives

Snort Subscriber Rules Update 2021-12-13


From: Research <research () sourcefire com>
Date: Mon, 13 Dec 2021 21:32:51 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
This release adds and modifies rules in several categories.

Details:
Talos is releasing updates to Snort 2 SIDs: 58740-58744 and Snort 3
SID: 300058, as well as a new Snort 2 SID: 58751 to address
CVE-2021-44228, an RCE vulnerability in the Apache Log4j API.

Talos has added and modified multiple rules in the file-multimedia and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=Jl75
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: