Talos Rules 2020-03-17
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the browser-ie, file-identify, policy-other and sql rule sets to provide coverage for emerging threats from these technologies.

Change logs

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091501.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)

Modified Rules:


 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091500.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)

Modified Rules:


 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091401.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)

Modified Rules:


 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091300.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)

Modified Rules:


 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)

Modified Rules:


 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (snort3-server-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (snort3-server-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (snort3-policy-other.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (snort3-server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (snort3-browser-ie.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (snort3-browser-ie.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (snort3-browser-ie.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (snort3-browser-ie.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (snort3-server-other.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (snort3-server-other.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (snort3-browser-ie.rules)
 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (snort3-server-other.rules)

Modified Rules:


 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (snort3-file-identify.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (snort3-file-identify.rules)
 * 1:688 <-> DISABLED <-> SQL sa login failed (snort3-sql.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (snort3-server-other.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (snort3-file-identify.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (snort3-file-identify.rules)

2020-03-17 12:18:23 UTC

Snort Subscriber Rules Update

Date: 2020-03-17

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:53452 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53461 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53466 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53460 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53459 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53465 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53450 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53453 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53469 <-> DISABLED <-> POLICY-OTHER FreeSWITCH mod_xml_rpc default credential login detected (policy-other.rules)
 * 1:53467 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53462 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53458 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53454 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53457 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53455 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53468 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)
 * 1:53451 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53449 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53463 <-> DISABLED <-> BROWSER-IE Microsoft Internet Explorer center element dynamic manipulation attempt (browser-ie.rules)
 * 1:53456 <-> ENABLED <-> SERVER-OTHER Oracle WebLogic Server IIOP remote code execution attempt (server-other.rules)
 * 1:53464 <-> DISABLED <-> SERVER-OTHER FreeSWITCH mod_xml_rpc arbitrary command execution attempt (server-other.rules)

Modified Rules:


 * 1:688 <-> DISABLED <-> SQL sa login failed (sql.rules)
 * 1:30524 <-> ENABLED <-> SERVER-OTHER OpenSSL TLSv1.1 heartbeat read overrun attempt (server-other.rules)
 * 1:23726 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)
 * 1:52056 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:23725 <-> ENABLED <-> FILE-IDENTIFY Portable Executable binary file magic detected (file-identify.rules)
 * 1:13797 <-> ENABLED <-> FILE-IDENTIFY Portable Executable compact binary file magic detected (file-identify.rules)