[Snort-users] CVE-2016-3237 Rule

Joel Esler (jesler) jesler at ...589...
Wed Dec 21 14:45:47 EST 2016

This vulnerability doesn’t look like something we’d be able to detect.  This is essentially trying to detect a MITM (Man in the middle) on a password change.

Joel Esler | Talos: Manager | jesler at ...589...<mailto:jesler at ...589...>

On Dec 21, 2016, at 6:50 AM, GPN SACC <gpnsacc at ...11827...<mailto:gpnsacc at ...11827...>> wrote:

Is there a rule to alert for MS16-101?

From the blog entry (http://blog.talosintel.com/2016/08/ms-tuesday.html)

MS16-101 addresses two elevation of privilege vulnerabilities. CVE-2016-3300 relates to how Windows Netlogon establishes a secure connection to systems whose domain controller is running either Windows Server 2012 or Windows Server 2012 R2. An attacker would require access to a domain-joined machine that points to one of these systems in order to leverage the vulnerability and elevate privileges on the domain-joined machine. CVE-2016-3237 is related to Kerberos reverting to NTLM as the default authentication protocol after improperly handling a password change request. In order to exploit this and bypass the Kerberos authentication mechanism, an attacker would need to launch a man-in-the-middle attack against the traffic between a target machine and its domain controller.  All supported versions of Windows are affected for the Kerberos elevation of privilege, while the netlogon vulnerability only affects all versions of Windows 8.1 and Server 2012.

I searched through the snort rules 39808-39829, 39831-39844 and did not find a rule for CVE,2016-3237.

Developer Access Program for Intel Xeon Phi Processors
Access to Intel Xeon Phi processor-based developer platforms.
With one year of Intel Parallel Studio XE.
Training and support from Colfax.
Order your platform today.http://sdm.link/intel_______________________________________________
Snort-users mailing list
Snort-users at lists.sourceforge.net<mailto:Snort-users at lists.sourceforge.net>
Go to this URL to change user options or unsubscribe:
Snort-users list archive:

Please visit http://blog.snort.org to stay current on all the latest Snort news!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-users/attachments/20161221/14ba1479/attachment.html>

More information about the Snort-users mailing list