Sourcefire VRT Update for Sourcefire 3D System

Date: 2014-07-22

This SRU number: 2014-07-21-001
Previous SRU number: 2014-07-16-001

Applies to:

This SEU number: 1144
Previous SEU: 1143

Applies to:

This is the complete list of rules added in SRU 2014-07-21-001 and SEU 1144.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
331451EXPLOITCisco Unified IP phone BVSMWeb portal attack attemptoffdropdrop
131452MALWARE-CNCWin.Trojan.Symmi variant outbound connection attemptoffdropdrop
131453MALWARE-CNCWin.Trojan.ChoHeap variant outbound connectionoffoffdrop
131454MALWARE-CNCWin.Trojan.ChoHeap variant outbound connectionoffoffoff
131455EXPLOIT-KITRig Exploit Kit Outbound DGA Requestoffdropdrop
131456BLACKLISTDNS request for known malware domain infolooks.org - Win.Trojan.SDBotoffdropdrop
131457BLACKLISTDNS request for known malware domain joydagaspy.biz - Win.Trojan.SDBotoffdropdrop
131458MALWARE-CNCWin.Trojan.SDBot variant outbound connection attemptoffdropdrop
131459MALWARE-CNCWin.Trojan.Jaktinier.A connection attemptoffoffoff
131460SERVER-WEBAPPPHP DNS parsing heap overflow attemptoffoffdrop
131461FILE-OFFICEMicrosoft Office Excel Malformed MSODrawing Record attemptoffoffdrop
131462FILE-OFFICEMicrosoft Office Malformed MSODrawing Record attemptoffoffdrop
131463BLACKLISTDNS request for known malware domain cd5c5c.com - Win.Trojan.Andromoffdropdrop
131464BLACKLISTDNS request for known malware domain disk57.com - Win.Trojan.Andromoffdropdrop
131465MALWARE-CNCWin.Trojan.Androm Click Fraud Requestoffdropdrop
131466MALWARE-CNCWin.Trojan.Androm Click Fraud Requestoffdropdrop
131467MALWARE-CNCWin.Trojan.Androm variant outbound connectionoffdropdrop
131468MALWARE-CNCWin.Trojan.Papras variant outbound connectionoffdropdrop
131469BROWSER-IEMicrosoft Internet Explorer getBoundingClientRect incorrect rebalancing attemptoffoffoff
131470BROWSER-IEMicrosoft Internet Explorer getBoundingClientRect incorrect rebalancing attemptoffoffdrop
131471BROWSER-IEMicrosoft Internet Explorer getBoundingClientRect incorrect rebalancing attemptoffoffoff
131472BLACKLISTDNS request for known malware domain nanoseklo.net - Win.Trojan.HW32offdropdrop
131473FILE-OFFICEMicrosoft Office Excel PtgName invalid index exploit attemptoffoffdrop
131474FILE-OFFICEMicrosoft Office Excel PtgName invalid index exploit attemptoffoffdrop
131475FILE-OFFICEMicrosoft Office Excel PtgName invalid index exploit attemptoffoffdrop
131476FILE-OFFICEMicrosoft Office Excel PtgName invalid index exploit attemptoffoffdrop
131485BROWSER-IEMicrosoft Internet Explorer onbeforeeditfocus element attribute use after free attemptoffdropdrop
131486BROWSER-IEMicrosoft Internet Explorer onbeforeeditfocus element attribute use after free attemptoffdropdrop
131487MALWARE-OTHERGame Over Zeus executable download detectedoffdropdrop
131488MALWARE-OTHERGame Over Zeus executable download detectedoffdropdrop
131489FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131490FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131491FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131492FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131493FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131494FILE-FLASHAdobe Flash security sandbox bypass attemptoffoffoff
131495FILE-FLASHAdobe Flash Player Microsoft Internet Explorer sandbox escape attemptoffdropdrop
131496FILE-FLASHAdobe Flash Player Microsoft Internet Explorer sandbox escape attemptoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
131477SERVER-OTHEROpenSSL SSL ChangeCipherSpec man-in-the-middle exploitation attemptoffoffdrop
131478SERVER-OTHEROpenSSL TLSv1.0 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffdrop
131479SERVER-OTHEROpenSSL TLSv1.1 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffdrop
131480SERVER-OTHEROpenSSL TLSv1.2 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffdrop
131481SERVER-OTHEROpenSSL SSL ChangeCipherSpec man-in-the-middle exploitation attemptoffoffoff
131482SERVER-OTHEROpenSSL TLSv1.0 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffoff
131483SERVER-OTHEROpenSSL TLSv1.1 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffoff
131484SERVER-OTHEROpenSSL TLSv1.2 ChangeCipherSpec man-in-the-middle exploitation attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.