Sourcefire VRT Update for Sourcefire 3D System

Date: 2014-11-24

This SRU number: 2014-11-24-001
Previous SRU number: 2014-11-20-001

Applies to:

This SEU number: 1210
Previous SEU: 1209

Applies to:

This is the complete list of rules modified in SRU 2014-11-24-001 and SEU 1210.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

Updated Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
110214BROWSER-PLUGINSShockwave ActiveX Control ActiveX clsid accessoffoffoff
117742FILE-OFFICEMicrosoft Office Word remote code execution attemptoffdropdrop
119357MALWARE-CNCWin.Worm.Sohanad.ila variant outbound connectionoffdropdrop
119367MALWARE-CNCWin.Worm.Vaubeg.A variant outbound connectionoffoffdrop
119400MALWARE-CNCWin.Worm.Sddrop.D variant outbound connectionoffoffoff
119401MALWARE-CNCWin.Worm.Sddrop.D variant outbound connectionoffoffoff
119495MALWARE-CNCWin.Worm.Pilleuz variant outbound connectionoffoffoff
119573MALWARE-CNCWin.Worm.Chiviper.C variant outbound connectionoffoffoff
119574MALWARE-CNCWin.Worm.Chiviper.C variant outbound connectionoffoffoff
119575MALWARE-CNCWin.Worm.Emold.U variant outbound connectionoffoffoff
119580MALWARE-CNCWin.Worm.Basun.wsc inbound connectionoffoffoff
119584MALWARE-CNCWin.Worm.Dref.C variant outbound connectionoffoffoff
119585MALWARE-CNCWin.Worm.Dref.C variant outbound connection - notificationoffoffoff
119593MALWARE-CNCWin.Worm.Agent.btxm variant outbound connection IRCoffoffoff
119703MALWARE-CNCWin.Worm.Dusta.br outbound connnectionoffdropdrop
119766MALWARE-CNCWin.Worm.Autorun variant outbound connectionoffoffoff
119918MALWARE-CNCWin.Worm.Ganelp.B variant outbound connectionoffoffoff
120017MALWARE-CNCWin.Worm.Koobface.dq variant outbound connectionoffoffoff
120022MALWARE-CNCWin.Worm.Padobot.z variant outbound connectionoffoffoff
120449MALWARE-CNCWin.Worm.Busifom.A variant outbound connectionoffoffoff
128054FILE-OTHERVBScript potential executable write attemptoffdropdrop
129443EXPLOIT-KITFiesta exploit kit outbound connection attemptoffoffdrop
131814MALWARE-CNCWin.Trojan.Darkcomet outbound keepalive signal sentoffoffoff
132409OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop
132410OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop
132414OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop
132415OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop
132416OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop
132417OS-WINDOWSMicrosoft Windows SChannel CertificateVerify buffer overflow attemptoffdropdrop