Snort mailing list archives
Snort Subscriber Rules Update 2019-11-12
From: Research <research () sourcefire com>
Date: Tue, 12 Nov 2019 19:29:53 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2019-1390: A coding deficiency exists in Microsoft Windows VBScript Engine that may lead to remote code execution. Previously released rules will detect attacks targeting these vulnerabilities and have been updated with the appropriate reference information. They are also included in this release and are identified with GID 1, SIDs 46548 through 46549. Microsoft Vulnerability CVE-2019-1393: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52205 through 52208. Microsoft Vulnerability CVE-2019-1394: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52209 through 52212. Microsoft Vulnerability CVE-2019-1395: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52217 through 52220. Microsoft Vulnerability CVE-2019-1396: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52213 through 52216. Microsoft Vulnerability CVE-2019-1408: A coding deficiency exists in Microsoft Win32k that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52225 through 52228. Microsoft Vulnerability CVE-2019-1429: A coding deficiency exists in Microsoft Scripting Engine that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52239 through 52240. Microsoft Vulnerability CVE-2019-1435: A coding deficiency exists in Microsoft Graphics Component that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52229 through 52232. Microsoft Vulnerability CVE-2019-1436: A coding deficiency exists in Microsoft Scripting Engine that may lead to information disclosure. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52233 through 52234. Microsoft Vulnerability CVE-2019-1437: A coding deficiency exists in Microsoft Graphics Component that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52223 through 52224. Microsoft Vulnerability CVE-2019-1438: A coding deficiency exists in Microsoft Graphics Component that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with GID 1, SIDs 52221 through 52222. Talos also has added and modified multiple rules in the browser-firefox, browser-ie, malware-cnc, os-mobile, os-windows, policy-other, protocol-scada and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJdywgwAAoJEPE/nha8pb+tO3wQALip1alqz3mllBXcYUnGMrsl /D8c6vPOoNjk8/NVh8SH/qDZbyEysvAsj+6+JgHG8kwoP2dUePpDSbyv9fSynHRa 2NjZz5e3RRz4TPBYv/mqgqYTsKHnR4KGs+vDRXdD3H9Mkwp4p1WnmlSe/M7pkP9m CFWm+DjLNKTn7d6AXKUh6LPX3ngF6g7sdAvor0a528/BADSuntg4qme3Jk1hq5is rJhwq5fK+TH2d6KhhznzORFXBLC1yjZmNNQrJBGuqgaDy6PhnSEDakMKC66eAEdP tHenHp/sojosn1xL/mKaT3iaFeM7h8FdP+ItXlZAXXNFX2YBMMojL603L9ohlEzF EggJ899ZLmkZqqAEiPFinc8q3tOlxHpBNJoaLLlbzpd2OuS6oXVSdgoxQa6+5Rht DcYCFAz0rnUWf6mBze6BhD2PAQcXjrrDz4cm5Csl4/eReCUXHfbLAaM4+ZS+lGBO QvZmkmSk3Bv+96/WbaDdJToFyZYltLnMAXCBVk6YVkxyzK+9+ZiLMkltNMvGxFEg hgpFbnT7keaoW60oEDbFx65jWqdmJdE4ffXs7h+Vfz4cDXLJBCSz3O192UuvV6Fv Ecw/r3M0OarO8d+ufNHJji0WgEl++NJE/jEEV6nBhWAHmFMpZQxKsfag24zGEpz+ eAM2I0KBOWQXf4rbkcFN =LNSb -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2019-11-12 Research (Nov 12)