Snort mailing list archives
Snort Subscriber Rules Update 2018-12-11
From: Research <research () sourcefire com>
Date: Tue, 11 Dec 2018 23:53:48 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2018-8583: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48515 through 48516. Microsoft Vulnerability CVE-2018-8617: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Previously released rules will detect attacks targeting these vulnerabilities and have been updated with the appropriate reference information. They are also included in this release and are identified with GID 1, SIDs 45142 through 45143. Microsoft Vulnerability CVE-2018-8618: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48509 through 48510. Microsoft Vulnerability CVE-2018-8619: A coding deficiency exists in Microsoft Internet Explorer that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48531 through 48532. Microsoft Vulnerability CVE-2018-8624: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48517 through 48518. Microsoft Vulnerability CVE-2018-8629: A coding deficiency exists in Microsoft Chakra Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48513 through 48514. Microsoft Vulnerability CVE-2018-8631: A coding deficiency exists in Microsoft Internet Explorer that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48533 through 48534. Microsoft Vulnerability CVE-2018-8634: A coding deficiency exists in Microsoft Edge that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 48519 through 48520. Cisco Talos would like to thank Symantec and the Cyber Threat Alliance for working with us to protect our users from Seedworm, rules are identified with GID 1, SIDs 48559 through 48562. Talos also has added and modified multiple rules in the and rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJcEE4KAAoJEPE/nha8pb+tQRoP/jvAr/gI//KftBAfIfE3XsIc 51Un+NWv5oGYCdT43vD55D6LldiHLGYn70VU+tejh8lcxAfnNV9nlLqDZ6w128hu Az9AvCr/7FsecfNSB2Jl6+8ML7ivdRSpydqat6YVFo6WlUIQauyqvj4C0ZSsBAbE e6xWeKw+hbKR3TTELvr8/ES1kI2Euua8tayk+m3adXVOIx/VAGBhVdjpmjNlhyf7 eyabIHK1WamdmiOILFVPdR1GK6/McboTe9fZVoasnd8oLR2SnK/eBRmE0gWWK/fT NQORV+ei1RH/cEGGZcWGbjL5Qttoc9NQjrRaBb1EO3zzPjzhJhK/FrArgyH1NgGT 9G/T9evIePNjWmi32ZpK9fBRxIHH6keaedb3p1wbUaUeFnr3lIVqBWfXuLpUbSfQ S9Mxc36gC2tLI3CmMhKFcb98jS6ahQNOO3obq5Hy3JVmTmrAqHXC9UmgNAF4z4RO RbJ1miVAQGWa17mSkmu2TxQkIrCMJovvwIJYpF4+Y64XzVU2hiviVrRK0vym3bdl 2gvqhKvlz+g2t0xSnhBgxc74ruJX/j5yDLXVeFm06y+ianN5H3mvh0eAo79GDHkh o+R2MMKVCntw7SjrFGrcmSe3h8GwsiarJ5045oI6sWjLt3Eyt3VxwUq62Z+/miuT /31gh8S6FHEPBOB5XH/q =lMKn -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2018-12-11 Research (Dec 11)
- <Possible follow-ups>
- Snort Subscriber Rules Update 2018-12-11 Research (Dec 11)