Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2015-12-15

This SRU number: 2015-12-15-001
Previous SRU number: 2015-12-09-001

Applies to:

This SEU number: 1396
Previous SEU: 1394

Applies to:

This is the complete list of rules added in SRU 2015-12-15-001 and SEU 1396.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
137037MALWARE-CNCWin.Trojan.Arfadinf variant outbound connectionoffdropdrop
137038SERVER-WEBAPPHumHub index.php from parameter SQL injection attemptoffoffoff
137039SERVER-WEBAPPAtlassian HipChat Plugin template injection remote code execution attemptoffoffdrop
137040BROWSER-PLUGINSMicrosoft CAPICOM CAPICOM.Certificates ActiveX clsid access attemptoffoffoff
137041BROWSER-PLUGINSMicrosoft CAPICOM CAPICOM.Certificates ActiveX clsid access attemptoffoffoff
137042BROWSER-PLUGINSMicrosoft CAPICOM CAPICOM.Certificates ActiveX clsid access attemptoffoffoff
137043BROWSER-PLUGINSMicrosoft CAPICOM CAPICOM.Certificates ActiveX clsid access attemptoffoffoff
137044BROWSER-PLUGINSMicrosoft CAPICOM CAPICOM.Certificates ActiveX clsid access attemptoffoffoff
137045MALWARE-CNCWin.Trojan.Kovtar outbound connectionoffdropdrop
137046BLACKLISTDNS request for known malware domain affiliatesys.info - Win.Trojan.Vonteeraoffdropdrop
137047MALWARE-CNCWin.Trojan.Vonterra outbound communicationoffdropdrop
137048MALWARE-CNCWin.Trojan.Bookworm variant outbound connectionoffoffoff
137049MALWARE-CNCWin.Trojan.Geratid variant outbound connectionoffdropdrop
137050MALWARE-CNCATSEngine initial beaconoffdropdrop
137051MALWARE-CNCATSEngine credit card number sent via URL parameteroffdropdrop
137052MALWARE-CNCATSEngine credit card number sent via URL parameteroffdropdrop
137053MALWARE-CNCWin.Trojan.Tdrop2 outbound communication attemptoffdropdrop
137054FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137055FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137056FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137057FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137058FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137059FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137060FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137061FILE-OTHERBACnet OPC client csv file buffer overflow attemptoffoffoff
137063MALWARE-CNCWin.Trojan.Paligenpo outbound connectionoffdropdrop
137064MALWARE-CNCWin.Trojan.Telehot outbound connectionoffdropdrop
137065MALWARE-CNCWin.Backdoor.Venik outbound connectionoffdropdrop
137066MALWARE-CNCWin.Trojan.Banloadoffdropdrop
137067MALWARE-CNCWin.Trojan.Droot outbound connectionoffdropdrop
137068MALWARE-CNCWin.Trojan.Flusihoc variant outbound connectionoffdropdrop
137069FILE-FLASHAdobe Flash Player object Filters type confusion use after free attemptoffdropdrop
137070FILE-FLASHAdobe Flash Player object Filters type confusion use after free attemptoffdropdrop
137071FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137072FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137073FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137074FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137075FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137076FILE-FLASHAdobe Flash Player ShaderParameter integer overflow attemptoffdropdrop
137077SERVER-WEBAPPJoomla JDatabaseDriverMysqli unserialize code execution attemptdropdropdrop
137078SERVER-WEBAPPJoomla JDatabaseDriverMysqli unserialize code execution attemptdropdropdrop
Low Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
137062APP-DETECT12P DNS request attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.