[Snort-sigs] Snort Subscriber Rules Update 2017-09-08

Research research at sourcefire.com
Fri Sep 8 19:11:35 EDT 2017


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of a vulnerability affecting Apache Struts.

Details:
CVE-2017-12611:
A coding deficiency exists in Apache Struts that may lead to remote
code execution.

Rules to detect attacks targeting this vulnerability are included in
this release and are identified with GID 1, SIDs 44327 through 44330.

Talos also has added and modified multiple rules in the
file-executable, file-other, malware-cnc, policy-other, server-apache
and server-webapp rule sets to provide coverage for emerging threats
from these technologies.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DrKH
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list