Talos Rules 2016-06-28
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-plugins, file-java, pua-adware and sql rule sets to provide coverage for emerging threats from these technologies.

Change logs

2016-06-28 14:55:03 UTC

Snort Subscriber Rules Update

Date: 2016-06-28

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2976.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:39353 <-> DISABLED <-> SERVER-WEBAPP WolfCMS file_manager arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:39348 <-> DISABLED <-> SERVER-WEBAPP SAP servlet authentication bypass attempt (server-webapp.rules)
 * 1:39349 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39350 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39352 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39354 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39355 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39351 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:34641 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:34642 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:37642 <-> ENABLED <-> PUA-ADWARE Win.Adware.Dealply outbound POST attempt (pua-adware.rules)
 * 1:38993 <-> ENABLED <-> SQL use of sleep function in HTTP header - likely SQL injection attempt (sql.rules)

2016-06-28 14:55:03 UTC

Snort Subscriber Rules Update

Date: 2016-06-28

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2980.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:39353 <-> DISABLED <-> SERVER-WEBAPP WolfCMS file_manager arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:39352 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39350 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39349 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39354 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39355 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39351 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39348 <-> DISABLED <-> SERVER-WEBAPP SAP servlet authentication bypass attempt (server-webapp.rules)

Modified Rules:


 * 1:34641 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:34642 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:37642 <-> ENABLED <-> PUA-ADWARE Win.Adware.Dealply outbound POST attempt (pua-adware.rules)
 * 1:38993 <-> ENABLED <-> SQL use of sleep function in HTTP header - likely SQL injection attempt (sql.rules)

2016-06-28 14:55:03 UTC

Snort Subscriber Rules Update

Date: 2016-06-28

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2982.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:39355 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39354 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39353 <-> DISABLED <-> SERVER-WEBAPP WolfCMS file_manager arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:39351 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39350 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39348 <-> DISABLED <-> SERVER-WEBAPP SAP servlet authentication bypass attempt (server-webapp.rules)
 * 1:39349 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39352 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)

Modified Rules:


 * 1:34641 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:34642 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:37642 <-> ENABLED <-> PUA-ADWARE Win.Adware.Dealply outbound POST attempt (pua-adware.rules)
 * 1:38993 <-> ENABLED <-> SQL use of sleep function in HTTP header - likely SQL injection attempt (sql.rules)

2016-06-28 14:55:03 UTC

Snort Subscriber Rules Update

Date: 2016-06-28

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:39355 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39354 <-> DISABLED <-> FILE-JAVA Oracle Java RangeStatisticImpl sandbox breach attempt (file-java.rules)
 * 1:39353 <-> DISABLED <-> SERVER-WEBAPP WolfCMS file_manager arbitrary PHP file upload attempt (server-webapp.rules)
 * 1:39352 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39351 <-> DISABLED <-> SERVER-WEBAPP SAP NetWeaver CrashFileDownloadServlet directory traversal attempt (server-webapp.rules)
 * 1:39350 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39349 <-> ENABLED <-> SERVER-WEBAPP Wordpress Mobile Detector Plugin remote file upload attempt (server-webapp.rules)
 * 1:39348 <-> DISABLED <-> SERVER-WEBAPP SAP servlet authentication bypass attempt (server-webapp.rules)

Modified Rules:


 * 1:34641 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:34642 <-> DISABLED <-> BROWSER-PLUGINS McAfee Virtual Technician ActiveX clsid access attempt (browser-plugins.rules)
 * 1:37642 <-> ENABLED <-> PUA-ADWARE Win.Adware.Dealply outbound POST attempt (pua-adware.rules)
 * 1:38993 <-> ENABLED <-> SQL use of sleep function in HTTP header - likely SQL injection attempt (sql.rules)