Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2015-07-02

This SRU number: 2015-07-01-001
Previous SRU number: 2015-06-30-001

Applies to:

This SEU number: 1314
Previous SEU: 1313

Applies to:

This is the complete list of rules added in SRU 2015-07-01-001 and SEU 1314.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
135024SERVER-WEBAPPWatchguard XCS mailqueue.spl command injection attemptoffoffdrop
135025SERVER-WEBAPPWatchguard XCS mailqueue.spl command injection attemptoffoffdrop
135026SERVER-WEBAPPWatchguard XCS mailqueue.spl command injection attemptoffoffdrop
135027MALWARE-CNCknown malicious SSL certificate - Troldesh C&Coffdropdrop
135028BLACKLISTDNS request for known malware domain killer0709.pf-control.de - Win.Keylogger.Lotroncoffdropdrop
135029MALWARE-CNCWin.Keylogger.Lotronc variant outbound connectionoffdropdrop
135030MALWARE-CNCWin.Trojan.Zeus variant outbound connectionoffdropdrop
135031MALWARE-CNCWin.Trojan.Konus outbound connection attemptoffdropdrop
135032SERVER-WEBAPPLANDesk Management Suite remote file include attemptoffoffdrop
135033SERVER-WEBAPPLANDesk Management Suite remote file include attemptoffoffdrop
135034MALWARE-CNCWin.Trojan.Konus outbound connection attemptoffdropdrop
135035MALWARE-CNCWin.Trojan.Taleretzbj outbound connection offdropdrop
135036MALWARE-CNCBackdoor.Perl.Santy inbound variant connection offdropdrop
135037MALWARE-CNCBackdoor.Perl.Santy outbound variant connection offdropdrop
135038SERVER-OTHERTrustwave ModSecurity chunked transfer encoding policy bypass attempt offoffdrop
135039MALWARE-CNCTrojan.Linux.Linuxor outbound variant connection offdropdrop
135042POLICY-OTHERApple Cups cupsd.conf change attemptoffoffoff
135043SERVER-OTHERApple Cups cupsd privilege escalation attemptoffoffdrop
135044BROWSER-WEBKITApple Safari URI spoofing attemptoffoffoff
135045BROWSER-WEBKITApple Safari URI spoofing attemptoffoffoff
135046BLACKLISTDNS request for known malware domain gotrubs.usoffdropdrop
135047MALWARE-CNCWin.Trojan.Scar variant outbound connectionoffdropdrop
135048FILE-FLASHAdobe Flash Player ByteArray uncompress domainMemory use after free attemptdropdropdrop
135049FILE-FLASHAdobe Flash Player ByteArray uncompress domainMemory use after free attemptdropdropdrop
135050MALWARE-CNCWin.Trojan.Scar variant outbound connectionoffdropdrop
135051BROWSER-FIREFOXMozilla Firefox IDL fragment privilege escalation attemptoffdropdrop
135052BROWSER-FIREFOXMozilla Firefox IDL fragment privilege escalation attemptoffdropdrop
135053BROWSER-IEMicrosoft Internet Explorer CSVGMarkerElement use after free attempt offoffoff
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
135040SERVER-WEBAPPPHP php_parse_metadata heap corruption attemptoffoffoff
135041SERVER-WEBAPPPHP php_parse_metadata heap corruption attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.