* Talos combines our security experts from TRAC, SecApps, and VRT teams.
This SRU number: 2015-12-15-001
Previous SRU number: 2015-12-09-001
Applies to:
This SEU number: 1396
Previous SEU: 1394
Applies to:
This is the complete list of rules added in SRU 2015-12-15-001 and SEU 1396.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
| GID | SID | Rule Group | Rule Message | Policy State | ||
|---|---|---|---|---|---|---|
| Con. | Bal. | Sec. | ||||
| 1 | 37037 | MALWARE-CNC | Win.Trojan.Arfadinf variant outbound connection | off | drop | drop |
| 1 | 37038 | SERVER-WEBAPP | HumHub index.php from parameter SQL injection attempt | off | off | off |
| 1 | 37039 | SERVER-WEBAPP | Atlassian HipChat Plugin template injection remote code execution attempt | off | off | drop |
| 1 | 37040 | BROWSER-PLUGINS | Microsoft CAPICOM CAPICOM.Certificates ActiveX clsid access attempt | off | off | off |
| 1 | 37041 | BROWSER-PLUGINS | Microsoft CAPICOM CAPICOM.Certificates ActiveX clsid access attempt | off | off | off |
| 1 | 37042 | BROWSER-PLUGINS | Microsoft CAPICOM CAPICOM.Certificates ActiveX clsid access attempt | off | off | off |
| 1 | 37043 | BROWSER-PLUGINS | Microsoft CAPICOM CAPICOM.Certificates ActiveX clsid access attempt | off | off | off |
| 1 | 37044 | BROWSER-PLUGINS | Microsoft CAPICOM CAPICOM.Certificates ActiveX clsid access attempt | off | off | off |
| 1 | 37045 | MALWARE-CNC | Win.Trojan.Kovtar outbound connection | off | drop | drop |
| 1 | 37046 | BLACKLIST | DNS request for known malware domain affiliatesys.info - Win.Trojan.Vonteera | off | drop | drop |
| 1 | 37047 | MALWARE-CNC | Win.Trojan.Vonterra outbound communication | off | drop | drop |
| 1 | 37048 | MALWARE-CNC | Win.Trojan.Bookworm variant outbound connection | off | off | off |
| 1 | 37049 | MALWARE-CNC | Win.Trojan.Geratid variant outbound connection | off | drop | drop |
| 1 | 37050 | MALWARE-CNC | ATSEngine initial beacon | off | drop | drop |
| 1 | 37051 | MALWARE-CNC | ATSEngine credit card number sent via URL parameter | off | drop | drop |
| 1 | 37052 | MALWARE-CNC | ATSEngine credit card number sent via URL parameter | off | drop | drop |
| 1 | 37053 | MALWARE-CNC | Win.Trojan.Tdrop2 outbound communication attempt | off | drop | drop |
| 1 | 37054 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37055 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37056 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37057 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37058 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37059 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37060 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37061 | FILE-OTHER | BACnet OPC client csv file buffer overflow attempt | off | off | off |
| 1 | 37063 | MALWARE-CNC | Win.Trojan.Paligenpo outbound connection | off | drop | drop |
| 1 | 37064 | MALWARE-CNC | Win.Trojan.Telehot outbound connection | off | drop | drop |
| 1 | 37065 | MALWARE-CNC | Win.Backdoor.Venik outbound connection | off | drop | drop |
| 1 | 37066 | MALWARE-CNC | Win.Trojan.Banload | off | drop | drop |
| 1 | 37067 | MALWARE-CNC | Win.Trojan.Droot outbound connection | off | drop | drop |
| 1 | 37068 | MALWARE-CNC | Win.Trojan.Flusihoc variant outbound connection | off | drop | drop |
| 1 | 37069 | FILE-FLASH | Adobe Flash Player object Filters type confusion use after free attempt | off | drop | drop |
| 1 | 37070 | FILE-FLASH | Adobe Flash Player object Filters type confusion use after free attempt | off | drop | drop |
| 1 | 37071 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37072 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37073 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37074 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37075 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37076 | FILE-FLASH | Adobe Flash Player ShaderParameter integer overflow attempt | off | drop | drop |
| 1 | 37077 | SERVER-WEBAPP | Joomla JDatabaseDriverMysqli unserialize code execution attempt | drop | drop | drop |
| 1 | 37078 | SERVER-WEBAPP | Joomla JDatabaseDriverMysqli unserialize code execution attempt | drop | drop | drop |
| GID | SID | Rule Group | Rule Message | Policy State | ||
|---|---|---|---|---|---|---|
| Con. | Bal. | Sec. | ||||
| 1 | 37062 | APP-DETECT | 12P DNS request attempt | off | off | off |
Updated rules can be found at this link.