This SRU number: 2015-02-25-001
Previous SRU number: 2015-02-23-001
Applies to:
This SEU number: 1257
Previous SEU: 1256
Applies to:
This is the complete list of rules added in SRU 2015-02-25-001 and SEU 1257.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 33592 | FILE-OTHER | Adobe Shockwave Player SwDir.dll PlayerVersion Buffer Overflow attempt | off | off | off |
1 | 33593 | FILE-OTHER | Adobe Shockwave Player SwDir.dll PlayerVersion Buffer Overflow attempt | off | off | off |
1 | 33594 | MALWARE-CNC | Win.Trojan.Upatre variant outbound connection | off | drop | drop |
1 | 33595 | SERVER-OTHER | GnuTLS TLSA record heap buffer overflow attempt | off | off | off |
1 | 33596 | SERVER-OTHER | GnuTLS TLSA record heap buffer overflow attempt | off | off | off |
1 | 33597 | SERVER-WEBAPP | ManageEngine Desktop Central MSP StatusUpdateServlet directory traversal attempt | off | off | drop |
1 | 33598 | SERVER-WEBAPP | ManageEngine Desktop Central MSP StatusUpdateServlet directory traversal attempt | off | off | drop |
1 | 33599 | SERVER-WEBAPP | ManageEngine Desktop Central MSP StatusUpdateServlet directory traversal attempt | off | off | drop |
1 | 33600 | MALWARE-CNC | Win.Trojan.Ramnit variant outbound detected | off | drop | drop |
1 | 33601 | FILE-PDF | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution attempt | off | off | drop |
1 | 33602 | FILE-PDF | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution attempt | off | off | drop |
1 | 33603 | FILE-OTHER | Microsoft Windows Fax Services Cover Page Editor Double Free Memory Corruption attempt | off | off | off |
1 | 33604 | FILE-OTHER | Microsoft Windows Fax Services Cover Page Editor Double Free Memory Corruption attempt | off | off | off |
1 | 33605 | BROWSER-IE | Microsoft Internet Explorer CAnchorElement use after free attempt | off | drop | drop |
1 | 33606 | BROWSER-IE | Microsoft Internet Explorer CAnchorElement use after free attempt | off | drop | drop |
1 | 33615 | FILE-IMAGE | Adobe Photoshop CS5 gif file heap corruption attempt | off | drop | drop |
1 | 33618 | MALWARE-BACKDOOR | Win.Trojan.lubot download | off | off | off |
1 | 33619 | MALWARE-BACKDOOR | Win.Trojan.lubot download | off | off | off |
1 | 33620 | MALWARE-CNC | Unix.Trojan.lubot outbound connection | off | drop | drop |
1 | 33621 | MALWARE-CNC | Unix.Trojan.lubot outbound connection | off | drop | drop |
1 | 33632 | SERVER-WEBAPP | PHP xmlrpc.php command injection attempt | off | off | off |
1 | 33633 | BLACKLIST | User-Agent known malicious user-agent - Downing - Win.Trojan.Otwycal | off | drop | drop |
1 | 33636 | SERVER-OTHER | SAP Sybase ESP xmlrpc unsafe pointer dereference attempt | off | off | off |
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 33607 | SERVER-WEBAPP | cron access | off | off | off |
1 | 33608 | SERVER-WEBAPP | bin access | off | off | off |
1 | 33609 | SERVER-WEBAPP | .wwwpasswd access | off | off | off |
1 | 33610 | SERVER-WEBAPP | .wwwgroup access | off | off | off |
1 | 33611 | SERVER-WEBAPP | httpd.conf access | off | off | off |
1 | 33612 | SERVER-WEBAPP | stronghold-status access | off | off | off |
1 | 33613 | SERVER-WEBAPP | stronghold-info access | off | off | off |
1 | 33614 | SERVER-WEBAPP | caucho-status access | off | off | off |
1 | 33622 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33623 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33624 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33625 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33626 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33627 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33628 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33629 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33630 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33631 | BROWSER-WEBKIT | Apple Safari feeds URI null pointer dereference denial of service attempt | off | off | off |
1 | 33634 | FILE-FLASH | Adobe Flash Player decompressing denial of service attempt | off | off | off |
1 | 33635 | FILE-FLASH | Adobe Flash Player decompressing denial of service attempt | off | off | off |
Updated rules can be found at this link.