[Snort-sigs] Sourcefire VRT Certified Snort Rules Update 2013-06-11

Research research at ...435...
Tue Jun 11 13:34:42 EDT 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of vulnerabilities affecting products from
Microsoft Corporation.

Details:
Microsoft Security Advisory MS13-047:
Internet Explorer suffers from programming errors that may lead to
remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 26843 through 26849,
26851 through 26853, 26867 through 26876, 26878, and 26882 through
26890.

Microsoft Security Advisory MS13-049:
A programming error exists in kernel-mode drivers that may lead to
remote code execution.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 26877.

Microsoft Security Advisory MS13-051:
Microsoft Office suffers from programming errors that may lead to
remote code execution.

A previously released rule will detect attacks targeting this
vulnerability and has been updated with the appropriate reference
information. It is included in this release and is identified with GID
1, SID 6700.

The Sourcefire VRT has also added and modified multiple rules in the
blacklist, browser-ie, browser-other, browser-plugins, deleted, dos,
exploit-kit, file-identify, file-image, file-office, file-other,
indicator-obfuscation, malware-backdoor, malware-cnc, malware-other,
os-windows, protocol-ftp, server-oracle, server-other and sql rule sets
to provide coverage for emerging threats from these technologies.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2013-06-11.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFRt1+zQLjqI2QiHVMRAmdLAJ9gVlQpefoaGn4c5i1LaxJ1icwgggCghfcF
0nR20G3SXJObKdZm5WgzbgA=
=SW4B
-----END PGP SIGNATURE-----





More information about the Snort-sigs mailing list