Snort mailing list archives

Snort Subscriber Rules Update 2023-05-09


From: Research <research () sourcefire com>
Date: Tue, 9 May 2023 17:40:21 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2023-24902:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 61705 through 61706,
Snort 3: GID 1, SID 300522.

Microsoft Vulnerability CVE-2023-24941:
A coding deficiency exists in Microsoft Windows Network File System
that may lead to remote code execution

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with:
Snort 2: GID 1, SID 61707,
Snort 3: GID 1, SID 61707.

Microsoft Vulnerability CVE-2023-24949:
A coding deficiency exists in Microsoft Windows Kernel that may lead to
an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 61714 through 61715,
Snort 3: GID 1, SID 300524.

Microsoft Vulnerability CVE-2023-24950:
A coding deficiency exists in Microsoft SharePoint Server that may lead
to spoofing.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with:
Snort 2: GID 1, SID 61720,
Snort 3: GID 1, SID 61720.

Microsoft Vulnerability CVE-2023-29324:
A coding deficiency exists in Microsoft Windows MSHTML Platform that
may lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 61718 through 61719,
Snort 3: GID 1, SID 300526.

Microsoft Vulnerability CVE-2023-29325:
A coding deficiency exists in Microsoft Windows OLE that may lead to
remote code execution

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 61716 through 61717,
Snort 3: GID 1, SID 300525.

Microsoft Vulnerability CVE-2023-29336:
A coding deficiency exists in Microsoft Win32k that may lead to an
escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 61722 through 61723,
Snort 3: GID 1, SID 300527.

Talos also has added and modified multiple rules in the file-office,
malware-other and server-webapp rule sets to provide coverage for
emerging threats from these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=hgfz
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: