Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2016-04-21

This SRU number: 2016-04-21-001
Previous SRU number: 2016-04-18-001

Applies to:

This SEU number: 1470
Previous SEU: 1468

Applies to:

This is the complete list of rules modified in SRU 2016-04-21-001 and SEU 1470.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

Updated Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
117904BLACKLISTURI request for known malicious URI - /tongji.jsoffdropdrop
118794DELETEDSERVER-WEBAPP RedHat JBoss Enterprise Application Platform JMX authentication bypass attempt
124642SERVER-WEBAPPRedHat JBoss Enterprise Application Platform JMX code execution attemptoffdropdrop
125100MALWARE-CNCWin.Trojan.Njrat variant outbound connectionoffdropdrop
125229MALWARE-CNCWin.Trojan.Darkkomet variant inbound connectionoffdropdrop
125230MALWARE-CNCWin.Trojan.Darkkomet variant outbound connectionoffdropdrop
136506MALWARE-CNCWin.Trojan.Njrat variant outbound connectionoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
336558SERVER-OTHERCisco ASA DHCPv6 relay solicit denial of service attemptoffoffoff