[Snort-sigs] Snort Subscriber Rules Update 2015-07-07

Research research at ...435...
Tue Jul 7 16:45:39 EDT 2015


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities exposed by a widely available leak of
the firm "Hacking Team".

Details:
Adobe Flash Player Vulnerability:
Adobe Flash Player suffers from programming errors that may lead to
remote code execution.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 35086 through 35089.

iOS Lockdown Vulnerability:
A programming error exists in iOS Lockdown service that may lead to
remote code execution.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 35090 through 35091.

Talos has also added and modified multiple rules in the blacklist,
browser-firefox, exploit-kit, file-flash, malware-cnc, os-mobile and
server-webapp rule sets to provide coverage for emerging threats from
these technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iD8DBQFVnDpzs9U0LCYEKaARAqdLAJ0e8q/6xzvXuQeoLjn5C2CxYvi3lACePB3B
ZRzbNPMmwmLOEiA1lX6UsvM=
=5H71
-----END PGP SIGNATURE-----





More information about the Snort-sigs mailing list