Sourcefire Rules Update for Sourcefire Intelligent Security Monitoring System

Date: 2004-04-15

This rules update applies to all models of the 2.7.x and 3.x Network Sensor and Management Console.

Synopsis:

The Sourcefire Vulnerability Research Team (VRT) has learned of serious vulnerabilities in Microsoft operating systems.

Successful exploitation of these vulnerabilities could present an attacker with the opportunity to execute code of their choosing on the target host with system privileges. This can lead to unauthorized administrative access to the host system. It is also possible for an attacker to cause a Denial of Service (DoS) condition.

Rules to detect exploitation of this issue are included in the rulepack. These are referenced as SIDs 2494, 2495, 2496 and will alert on attempts to exploit CVE ID - CAN-2003-0813.

In addition, the VRT has done significant work to enhance the accuracy and efficiency of the Sourcefire ISM detection capabilities. Multiple rules were added or modified to reduce the possibility of false positives and to utilize recent enhancements in the detection engine.

WARNING:

If you are running a Sourcefire Network Sensor or Management Console v2.7, you must be running patch 3 or higher to install this update. The latest patch information can be found here.

https://support.sourcefire.com/cgi-bin/Main.pl/downloads

If you are running a Sourcefire Network Sensor or Management Console v3.0, you must install Sourcefire_IMS_Upgrade-3.0.1-19.sh before installing this rule pack. This patch can be found here.

https://support.sourcefire.com/cgi-bin/Main.pl/downloads

Rule Pack Summary:

SIDs:

Rules Application:

Separate rule packs and application instructions are available for all Sourcefire products. Detailed instructions can be found on the Sourcefire Customer Support Site in the downloads section for each product.

For Assistance:

If you have any questions or require assistance at any time.