Snort mailing list archives

Snort Subscriber Rules Update 2016-11-08


From: Research <research () sourcefire com>
Date: Tue, 8 Nov 2016 18:53:53 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Security Bulletin MS16-129:
A coding deficiency exists in Microsoft Edge that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40647 through 40656,
40659 through 40662, 40669 through 40670, 40683 through 40684, 40715
through 40716, and 40721 through 40722.

Microsoft Security Bulletin MS16-130:
A coding deficiency exists in Microsoft Windows that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40645 through 40646,
40671 through 40672, and 40677 through 40678.

Microsoft Security Bulletin MS16-132:
A coding deficiency exists in Microsoft Graphics Component that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40675 through 40676,
40703 through 40706, and 40729 through 40730.

Microsoft Security Bulletin MS16-133:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40667 through 40668,
40673 through 40674, 40679 through 40682, 40701 through 40702, 40711
through 40712, 40717 through 40720, and 40723 through 40726.

Microsoft Security Bulletin MS16-134:
A coding deficiency exists in Microsoft Common Log File System Driver
that may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40657 through 40658
and 40689 through 40692.

Microsoft Security Bulletin MS16-135:
A coding deficiency exists in Microsoft Kernel-Mode Drivers that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40663 through 40666
and 40685 through 40688.

Microsoft Security Bulletin MS16-138:
A coding deficiency exists in Microsoft Virtual Hard Drive that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40693 through 40694.

Microsoft Security Bulletin MS16-142:
Microsoft Internet Explorer suffers from programming errors that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 40669 through 40670,
40713 through 40714, and 40721 through 40722.

Talos has also added and modified multiple rules in the blacklist,
browser-ie, exploit-kit, file-flash, file-image, file-office,
file-other, file-pdf, malware-cnc and policy-other rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlgiH0AACgkQs9U0LCYEKaAnHgCfaIwdSjS92Hzqg95xGX6gzrqm
fdMAnjXDSvlmSMaJ9xFaV1Vj0EMRxfdx
=veoi
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today. http://sdm.link/xeonphi
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: