VRT Advisories


September 2010 Archive

VRT Rules 2010-09-27

Sourcefire VRT Rules Update

Date: 2010-09-27

Synopsis:

This release adds and modifies rules in several categories.

Details:

As a result of ongoing research, the Sourcefire VRT has added and modified multiple rules in the chat, dns, exploit, ftp, imap, misc, netbios, oracle, policy, pop3, rpc, specific-threats sql, tftp, web-activex, web-client and web-misc rule sets to provide coverage for emerging threats from these technologies.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 27, 2010



VRT Rules 2010-09-23

Sourcefire VRT Rules Update

Date: 2010-09-23

Synopsis:

The Sourcefire VRT is aware of a vulnerability affecting Microsoft .NET applications.

Details:

Microsoft .NET Framework Information Disclosure (CVE-2010-3332): The Microsoft .NET Framework discloses enough information in error responses that an attacker is able to decrypt and modify encrypted data. The attacker is also able to forge cookies and obtain application files via an Oracle padding attack.

Rules to detect attacks targeting this vulnerability are included in this release and are identified with GID 3, SIDs 17428 and 17429.

Additionally, the Sourcefire VRT has added and modified multiple rules in the chat, dos, exploit, ftp, icmp, imap, mysql, netbios, oracle, shellcode, specific-threats tftp, web-activex, web-client and web-misc rule sets to provide coverage for emerging threats from these technologies.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 23, 2010



VRT Rules 2010-09-21

Sourcefire VRT Rules Update

Date: 2010-09-21

Synopsis:

This release adds and modifies rules in several categories.

Details:

As a result of ongoing research, the Sourcefire VRT has added and modified multiple rules in the dos, exploit, ftp, imap, misc, netbios, oracle, pop3, rpc, shellcode, smtp, specific-threats and web-client rule sets to provide coverage for emerging threats from these technologies.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 21, 2010



VRT Rules 2010-09-15

Sourcefire VRT Rules Update

Date: 2010-09-15

Synopsis:

The Sourcefire VRT is aware of a vulnerability affecting Microsoft OWA.

Details:

Microsoft Security Advisory (2401593):
Microsoft Outlook Web Access contains a programming error that may allow a remote attacker to elevate privileges on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 17296.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 15, 2010



VRT Rules 2010-09-14

Sourcefire VRT Rules Update

Date: 2010-09-14

Synopsis:

The Sourcefire VRT is aware of vulnerabilities affecting Microsoft and Adobe products.

Details:

Microsoft Security Advisory MS10-061:
The Microsoft Windows Print Spooler service contains a programming error that may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability is included in this release and are identified with GID 3, SIDs 17252 and 17253.

Microsoft Security Advisory MS10-062:
Microsoft Windows Media Player contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17242.

Microsoft Security Advisory MS10-063:
Microsoft Windows XP and Vista contain a programming error that may allow a remote attacker to execute code on an affected system via the use of specially crafted Uniscribe fonts.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17256.

Microsoft Security Advisory MS10-064:
Microsoft Outlook contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17251.

Microsoft Security Advisory MS10-065:
Microsoft Internet Information Server (IIS) contains a programming error that may allow a remote attacker to execute code on an affected system.

Rules to detect attacks targeting this vulnerability is included in this release and are identified with GID 3, SIDs 17254 and 17255.

Microsoft Security Advisory MS10-067:
Microsoft WordPad contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17250.

Microsoft Security Advisory MS10-068:
Microsoft LSASS contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 3, SID 17249.

Adobe Security Bulletin APSA10-03: Adobe Flash Player contains a programming error that may allow a remote attacker to execute code on an affected system.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 17257.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 14, 2010



VRT Rules 2010-09-10

Sourcefire VRT Rules Update

Date: 2010-09-10

Synopsis:

The Sourcefire VRT is aware of a virus currently spreading on the Internet.

Details:

VBMania Mass Mailing Worm The VBMania mass mailing worm is known to be propagating throughout the Internet via email. The virus will copy itself to mapped drives on the victim host and attempt to use MAPI to mail itself to all contacts found on the system.

Rules to detect attacks by this virus are included in this release and are identified with GID 1, SIDs 17234 and 17235.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 10, 2010



VRT Rules 2010-09-09

Sourcefire VRT Rules Update

Date: 2010-09-09

Synopsis:

The Sourcefire VRT is aware of a vulnerability affecting Adobe Acrobat Reader and Adobe Acrobat.

Details:

Adobe Acrobat RCE (CVE-2010-2883): Adobe Acrobat Reader and Adobe Acrobat contains a programming error that may allow a remote attacker to execute code on an affected system. The problem occurs when parsing TrueType font data.

A rule to detect attacks targeting this vulnerability is included in this release and is identified with GID 1, SID 17233.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 09, 2010



VRT Rules 2010-09-07

Sourcefire VRT Rules Update

Date: 2010-09-07

Synopsis:

This release adds and modifies rules in several categories.

Details:

As a result of ongoing research, the Sourcefire VRT has added and modified multiple rules in the policy, specific-threats and web-client rule sets to provide coverage for emerging threats from these technologies.

Rule Pack Summary:

For a complete list of new and modified rules, click here.

Warning:

Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules

Posted by on Sep 07, 2010