Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2016-03-09

This SRU number: 2016-03-08-001
Previous SRU number: 2016-03-07-001

Applies to:

This SEU number: 1445
Previous SEU: 1444

Applies to:

This is the complete list of rules added in SRU 2016-03-08-001 and SEU 1445.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
138131SERVER-WEBAPPNetgear ProSafe NMS image.do directory traversal attemptoffoffoff
138132SERVER-WEBAPPNetgear ProSafe NMS image.do directory traversal attemptoffoffoff
138133EXPLOIT-KITAngler exploit kit gate redirectoroffoffdrop
138134MALWARE-CNCknown malicious SSL certificate - Win.Trojan.Adwindoffdropdrop
338137SERVER-OTHERCisco DPC2203 arbitrary code execution attemptoffoffdrop
338138SERVER-OTHERCisco DPQ3925 denial of service attemptoffoffdrop
338139SERVER-OTHERCisco DPQ3939 denial of service attemptoffoffdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
138135BROWSER-OTHERApple iOS CoreGraphics library PDF embedded image handling information leak attemptoffoffoff
Low Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
138130POLICY-OTHERHTTP Request missing user-agentoffoffoff
138136SERVER-MAILexcessive email recipients - potential spam attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.