Talos Rules 2015-12-17
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the app-detect, blacklist, browser-plugins, file-flash, file-other, malware-cnc and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2015-12-17 17:10:03 UTC

Snort Subscriber Rules Update

Date: 2015-12-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2962.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules)
 * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules)
 * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)

Modified Rules:


 * 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules)
 * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
 * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)

2015-12-17 17:10:03 UTC

Snort Subscriber Rules Update

Date: 2015-12-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2975.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules)
 * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules)
 * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)

Modified Rules:


 * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules)
 * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
 * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)

2015-12-17 17:10:03 UTC

Snort Subscriber Rules Update

Date: 2015-12-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2976.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules)
 * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules)
 * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)

Modified Rules:


 * 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules)
 * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
 * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
 * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)

2015-12-17 17:10:03 UTC

Snort Subscriber Rules Update

Date: 2015-12-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2980.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:37116 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37115 <-> ENABLED <-> FILE-FLASH Adobe Flash Player DisplacementMapFilter mapBitmap use after free attempt (file-flash.rules)
 * 1:37114 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37113 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37112 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37111 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PCRE parsing out of bounds read attempt (file-flash.rules)
 * 1:37110 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37109 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37108 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37107 <-> ENABLED <-> FILE-FLASH Adobe Flash Player selection.setFocus use after free attempt (file-flash.rules)
 * 1:37106 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37105 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37104 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37103 <-> ENABLED <-> FILE-FLASH Adobe Flash Player MovieClip object use-after-free attempt (file-flash.rules)
 * 1:37102 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37101 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Nessfi outbound connection (malware-cnc.rules)
 * 1:37100 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Dashikut outbound connection (malware-cnc.rules)
 * 1:37099 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37098 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37097 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37096 <-> DISABLED <-> SERVER-WEBAPP Joomla Component com_gmaps SQL injection attempt (server-webapp.rules)
 * 1:37095 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37094 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37093 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37092 <-> ENABLED <-> FILE-FLASH Adobe Flash Player SoundURLStream memory corruption attempt (file-flash.rules)
 * 1:37091 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37090 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37089 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37088 <-> ENABLED <-> FILE-FLASH Adobe Flash Player PrintJob object use-after-free attempt (file-flash.rules)
 * 1:37087 <-> DISABLED <-> OS-WINDOWS Microsoft Windows Metafile invalid header size integer overflow (os-windows.rules)
 * 1:37086 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37085 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37084 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37083 <-> ENABLED <-> FILE-FLASH Adobe Flash Player byte array memory corruption attempt (file-flash.rules)
 * 1:37082 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37081 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37080 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)
 * 1:37079 <-> ENABLED <-> FILE-FLASH Adobe Flash Player String length heap buffer overflow attempt (file-flash.rules)

Modified Rules:


 * 1:21860 <-> ENABLED <-> MALWARE-CNC Phoenix exploit kit post-compromise behavior (malware-cnc.rules)
 * 1:35648 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:35649 <-> ENABLED <-> FILE-FLASH Adobe Flash Player XML pointer wrong parent reference (file-flash.rules)
 * 1:37077 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)
 * 1:37078 <-> ENABLED <-> SERVER-WEBAPP Joomla JDatabaseDriverMysqli unserialize code execution attempt (server-webapp.rules)