Snort mailing list archives

Snort Subscriber Rules Update 2017-07-11


From: Research <research () sourcefire com>
Date: Tue, 11 Jul 2017 18:36:27 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2017-0243:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Previously released rules will detect attacks targeting these
vulnerabilities and have been updated with the appropriate reference
information. They are also included in this release and are identified
with GID 1, SIDs 42755 through 42756.

Microsoft Vulnerability CVE-2017-8577:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43490 through 43491.

Microsoft Vulnerability CVE-2017-8578:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43473 through 43474.

Microsoft Vulnerability CVE-2017-8594:
Microsoft Internet Explorer suffers from programming errors that may
lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43521 through 43522.

Microsoft Vulnerability CVE-2017-8598:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43469 through 43470.

Microsoft Vulnerability CVE-2017-8601:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43465 through 43466.

Microsoft Vulnerability CVE-2017-8605:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Previously released rules will detect attacks targeting these
vulnerabilities and have been updated with the appropriate reference
information. They are also included in this release and are identified
with GID 1, SIDs 42753 through 42754.

Microsoft Vulnerability CVE-2017-8617:
Microsoft Edge suffers from programming errors that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43460 through 43463.

Microsoft Vulnerability CVE-2017-8618:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43471 through 43472.

Microsoft Vulnerability CVE-2017-8619:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 43492 through 43493.


Talos also has added and modified multiple rules in the browser-ie,
browser-other, browser-plugins, file-flash, file-other,
indicator-compromise, malware-cnc, os-windows, server-apache and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBAgAGBQJZZRqpAAoJEPE/nha8pb+tkcQQAI/c/msCGmaluKcg9pOLUIR6
5LrZ/Yt8vg9x7q6PGWz5oKvC5A9je4hkde2bHPGHouCNtSQr3L5tjfjjuI1wDpP6
fTHFQbwVSKGsObkYGh9JGGFNTNLeEwVhYCI7CJP5ko6WmQ9A+brKE+3UUR5H7X09
Nx2N7DWn/IIXLiZDsp9VaC50/fnVnngf0vwCZpJDU0IX/cowif9YftxjyMqMIUdF
NfimIC6QnQ8EArpXygMMi+iQCW5Z4BIp7jDJII3im2P34qokud7ths41ZGZgEBIy
yoc6wOGaXUaHUk8E6H0y+Yg6+HjggPkD81JGVesdZB/0ESTQ4o5VMVwcVJ7GmcX2
hslz/wYGwjdM6ivEw5deHgVg8SJb9a1vAP8bYi4sigV7Av2ABATaROuxXbt+A+pY
vxLCCr2whnx78lNOGpNRArao76YTvvbcqiz9A3MCuxe37ZVI7Cswb7+kE/1wB74H
6IvG3iw3MNDR3bSN9DiivcyBNO0oaekNcsONq5iEyIR9Chy0T8cjUsoeQirzgoLy
wsVDktisGuGxw2SR9XRwZQCqUTl86+xQeuTAjBb5d6owYk+T67RHRHcuY2k+q/lD
kCf6JM0pU4KgjhZa+mvA22FEU9D1TCud95qGfZPbSgzDSqvURbWnrM0RnBiGkmG7
fvyVZfOUiScxI51/mpM9
=ixwn
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

http://www.snort.org

Please visit http://blog.snort.org for the latest news about Snort!

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: