Talos Rules 2017-03-07
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-plugins, file-office, indicator-obfuscation, policy-other, server-apache and server-webapp rule sets to provide coverage for emerging threats from these technologies.

For information about Snort Subscriber Rulesets available for purchase, please visit the Snort product page.

Change logs

2017-03-07 22:23:05 UTC

Snort Subscriber Rules Update

Date: 2017-03-07

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2976.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:41818 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41837 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41836 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41820 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41817 <-> DISABLED <-> SERVER-WEBAPP generic SQL select statement possible sql injection (server-webapp.rules)
 * 1:41821 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41838 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41822 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41828 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41823 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41824 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41825 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41826 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41827 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41819 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41829 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41832 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41830 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41831 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41834 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41833 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41835 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)

Modified Rules:


 * 1:34944 <-> DISABLED <-> POLICY-OTHER Arcserve Unified Data Protection Management credential disclosure attempt (policy-other.rules)
 * 1:37273 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:37274 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:19437 <-> DISABLED <-> INDICATOR-OBFUSCATION select concat statement - possible sql injection (indicator-obfuscation.rules)

2017-03-07 22:23:05 UTC

Snort Subscriber Rules Update

Date: 2017-03-07

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:41832 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41830 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41831 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41828 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41829 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41827 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41818 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41819 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41820 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41821 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41822 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41823 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41824 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41825 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41826 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41817 <-> DISABLED <-> SERVER-WEBAPP generic SQL select statement possible sql injection (server-webapp.rules)
 * 1:41838 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41837 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41835 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41836 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41833 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41834 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)

Modified Rules:


 * 1:37273 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:37274 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:19437 <-> DISABLED <-> INDICATOR-OBFUSCATION select concat statement - possible sql injection (indicator-obfuscation.rules)
 * 1:34944 <-> DISABLED <-> POLICY-OTHER Arcserve Unified Data Protection Management credential disclosure attempt (policy-other.rules)

2017-03-07 22:23:05 UTC

Snort Subscriber Rules Update

Date: 2017-03-07

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:41838 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41837 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41836 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41835 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPEvent access attempt (browser-plugins.rules)
 * 1:41834 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41833 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41832 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41831 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPTZ access attempt (browser-plugins.rules)
 * 1:41830 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41829 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41828 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41827 <-> DISABLED <-> BROWSER-PLUGINS WebGate eDVR Manager WESPPlayback access attempt (browser-plugins.rules)
 * 1:41826 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41825 <-> DISABLED <-> SERVER-WEBAPP WordPress Plugins Simple Ads Manager information disclosure attempt (server-webapp.rules)
 * 1:41824 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41823 <-> DISABLED <-> SERVER-OTHER Nagios Core privilege escalation attempt (server-other.rules)
 * 1:41822 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41821 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41820 <-> DISABLED <-> SERVER-WEBAPP Borland AccuRev Reprise License Server diagnostics_doit outputfile parameter directory traversal attempt (server-webapp.rules)
 * 1:41819 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41818 <-> ENABLED <-> SERVER-APACHE Apache Struts remote code execution attempt (server-apache.rules)
 * 1:41817 <-> DISABLED <-> SERVER-WEBAPP generic SQL select statement possible sql injection (server-webapp.rules)

Modified Rules:


 * 1:37273 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:37274 <-> ENABLED <-> FILE-OFFICE Microsoft Office RTF parser heap overflow attempt (file-office.rules)
 * 1:19437 <-> DISABLED <-> INDICATOR-OBFUSCATION select concat statement - possible sql injection (indicator-obfuscation.rules)
 * 1:34944 <-> DISABLED <-> POLICY-OTHER Arcserve Unified Data Protection Management credential disclosure attempt (policy-other.rules)