[Snort-sigs] Shellshock CVE 2014-6271

Alex McDonnell amcdonnell at ...435...
Thu Oct 9 12:10:15 EDT 2014


Just confirmed that is not the case. The rules are still part of our
ruleset. They were even put into community so that free subscribers
wouldn't have to wait 30 days.

Alex McDonnell
TALOS Response Team Lead

On Thu, Oct 9, 2014 at 11:44 AM, Lukas Matt <lukas.matt at ...525...> wrote:

>  Hi,
>
> just updated the IPS pattern and recognized that you removed the
> Shellshock rules.
> I was not able to find a explanation on your homepage. Were they too noisy?
>
> Regards
>
> --
>   Lukas Matt
> Deep Packet Inspection Developer, SophosLabs
> O: (+49) 721-25516-322 / M: (+49) 174-3440-555
>
>
> ------------------------------------------------------------------------------
> Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
> Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
> Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
> Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
>
> http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/snort-sigs
> http://www.snort.org
>
>
> Please visit http://blog.snort.org for the latest news about Snort!
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20141009/36405c5b/attachment.html>


More information about the Snort-sigs mailing list