Talos has added and modified multiple rules in the browser-ie, browser-plugins, file-office, file-other, file-pdf, malware-cnc, policy-other and server-webapp rule sets to provide coverage for emerging threats from these technologies.
For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49081 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49086 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49082 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49084 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49091 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49083 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49097 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49085 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49094 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49092 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49095 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49096 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49093 <-> DISABLED <-> SERVER-WEBAPP Coaster CMS stored cross site scripting attempt (server-webapp.rules) * 3:49089 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules) * 3:49087 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2019-0775 attack attempt (policy-other.rules) * 3:49088 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules)
* 1:42231 <-> DISABLED <-> FILE-OFFICE RTF url moniker COM file download attempt (file-office.rules) * 1:48889 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules) * 1:48888 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49091 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49082 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49095 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49092 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49097 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49094 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49096 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49081 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49084 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49086 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49093 <-> DISABLED <-> SERVER-WEBAPP Coaster CMS stored cross site scripting attempt (server-webapp.rules) * 1:49083 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49090 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:49085 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 3:49087 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2019-0775 attack attempt (policy-other.rules) * 3:49088 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules) * 3:49089 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules)
* 1:43004 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:48889 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules) * 1:42231 <-> DISABLED <-> FILE-OFFICE RTF url moniker COM file download attempt (file-office.rules) * 1:48888 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49097 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (snort3-browser-plugins.rules) * 1:49082 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (snort3-file-pdf.rules) * 1:49096 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (snort3-browser-plugins.rules) * 1:49083 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (snort3-browser-ie.rules) * 1:49084 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (snort3-browser-ie.rules) * 1:49086 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (snort3-file-other.rules) * 1:49085 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (snort3-file-other.rules) * 1:49081 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (snort3-file-pdf.rules) * 1:49092 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (snort3-malware-cnc.rules) * 1:49095 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (snort3-browser-plugins.rules) * 1:49091 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (snort3-malware-cnc.rules) * 1:49094 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (snort3-browser-plugins.rules) * 1:49090 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (snort3-server-samba.rules) * 1:49093 <-> DISABLED <-> SERVER-WEBAPP Coaster CMS stored cross site scripting attempt (snort3-server-webapp.rules)
* 1:48889 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (snort3-file-pdf.rules) * 1:43004 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (snort3-server-samba.rules) * 1:48888 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (snort3-file-pdf.rules) * 1:42231 <-> DISABLED <-> FILE-OFFICE RTF url moniker COM file download attempt (snort3-file-office.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49096 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49095 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49092 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49083 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49097 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49085 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49082 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49093 <-> DISABLED <-> SERVER-WEBAPP Coaster CMS stored cross site scripting attempt (server-webapp.rules) * 1:49086 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49090 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:49094 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49091 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49084 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49081 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 3:49087 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2019-0775 attack attempt (policy-other.rules) * 3:49088 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules) * 3:49089 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules)
* 1:48889 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules) * 1:43004 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:48888 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules) * 1:42231 <-> DISABLED <-> FILE-OFFICE RTF url moniker COM file download attempt (file-office.rules)
This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091200.
The format of the file is:
gid:sid <-> Default rule state <-> Message (rule group)
* 1:49083 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 1:49082 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49081 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader JavaScript out-of-bounds read (file-pdf.rules) * 1:49097 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49096 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49095 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49094 <-> DISABLED <-> BROWSER-PLUGINS IBM Lotus Domino Quickr ActiveX clsid access attempt (browser-plugins.rules) * 1:49093 <-> DISABLED <-> SERVER-WEBAPP Coaster CMS stored cross site scripting attempt (server-webapp.rules) * 1:49092 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49091 <-> DISABLED <-> MALWARE-CNC Win.Trojan.Dragonok variant post-compromise outbound connection detected (malware-cnc.rules) * 1:49090 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:49086 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49085 <-> ENABLED <-> FILE-OTHER Ghostscript PostScript remote code execution attempt (file-other.rules) * 1:49084 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer CTextElement use after free attempt (browser-ie.rules) * 3:49087 <-> ENABLED <-> POLICY-OTHER TRUFFLEHUNTER TALOS-2019-0775 attack attempt (policy-other.rules) * 3:49088 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules) * 3:49089 <-> ENABLED <-> FILE-OTHER TRUFFLEHUNTER TALOS-2019-0773 attack attempt (file-other.rules)
* 1:43004 <-> ENABLED <-> SERVER-SAMBA Samba is_known_pipe arbitrary module load code execution attempt (server-samba.rules) * 1:48888 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules) * 1:42231 <-> DISABLED <-> FILE-OFFICE RTF url moniker COM file download attempt (file-office.rules) * 1:48889 <-> ENABLED <-> FILE-PDF Adobe Acrobat PDF out-of-bounds read attempt (file-pdf.rules)