Snort mailing list archives

Snort Subscriber Rules Update 2019-11-12


From: Research <research () sourcefire com>
Date: Tue, 12 Nov 2019 19:29:53 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2019-1390:
A coding deficiency exists in Microsoft Windows VBScript Engine that
may lead to remote code execution.

Previously released rules will detect attacks targeting these
vulnerabilities and have been updated with the appropriate reference
information. They are also included in this release and are identified
with GID 1, SIDs 46548 through 46549.

Microsoft Vulnerability CVE-2019-1393:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52205 through 52208.

Microsoft Vulnerability CVE-2019-1394:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52209 through 52212.

Microsoft Vulnerability CVE-2019-1395:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52217 through 52220.

Microsoft Vulnerability CVE-2019-1396:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52213 through 52216.

Microsoft Vulnerability CVE-2019-1408:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52225 through 52228.

Microsoft Vulnerability CVE-2019-1429:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52239 through 52240.

Microsoft Vulnerability CVE-2019-1435:
A coding deficiency exists in Microsoft Graphics Component that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52229 through 52232.

Microsoft Vulnerability CVE-2019-1436:
A coding deficiency exists in Microsoft Scripting Engine that may lead
to information disclosure.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52233 through 52234.

Microsoft Vulnerability CVE-2019-1437:
A coding deficiency exists in Microsoft Graphics Component that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52223 through 52224.

Microsoft Vulnerability CVE-2019-1438:
A coding deficiency exists in Microsoft Graphics Component that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 52221 through 52222.

Talos also has added and modified multiple rules in the
browser-firefox, browser-ie, malware-cnc, os-mobile, os-windows,
policy-other, protocol-scada and server-webapp rule sets to provide
coverage for emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=LNSb
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: