Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2016-07-26

This SRU number: 2016-07-25-001
Previous SRU number: 2016-07-21-001

Applies to:

This SEU number: 1519
Previous SEU: 1518

Applies to:

This is the complete list of rules added in SRU 2016-07-25-001 and SEU 1519.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
139683FILE-IMAGEApple Core Graphics BMP img_decode_read memory corruption attemptoffdropdrop
139684FILE-IMAGEApple Core Graphics BMP img_decode_read memory corruption attemptoffdropdrop
139713MALWARE-OTHERMKVIS outbound communication attemptoffdropdrop
139714SERVER-WEBAPPphpFileManager command injection attemptoffoffoff
139715SERVER-WEBAPPphpFileManager command injection attemptoffoffoff
139716SERVER-WEBAPPphpFileManager command injection attemptoffoffoff
139717SERVER-WEBAPPphpFileManager command injection attemptoffoffoff
139718BLACKLISTDNS request for known malware domain ns1.logitech-usa.com - pisloaderoffdropdrop
139719BLACKLISTDNS request for known malware domain globalprint-us.com - pisloaderoffdropdrop
139720BLACKLISTDNS request for known malware domain intranetwabcam.com - pisloaderoffdropdrop
139721BLACKLISTDNS request for known malware domain login.access-mail.com - pisloaderoffdropdrop
139722BLACKLISTDNS request for known malware domain glb.it-desktop.com - pisloaderoffdropdrop
139723BLACKLISTDNS request for known malware domain local.it-desktop.com - pisloaderoffdropdrop
139724BLACKLISTDNS request for known malware domain hi.getgo2.com - pisloaderoffdropdrop
139725SERVER-WEBAPPDrupal RESTWS restws_page_callback command injection attemptoffdropdrop
139726SERVER-WEBAPPDrupal RESTWS restws_page_callback command injection attemptoffdropdrop
139727FILE-FLASHAdobe Flash Player Rectangle constructor use after free attemptoffdropdrop
139728FILE-FLASHAdobe Flash Player Rectangle constructor use after free attemptoffdropdrop
139729INDICATOR-COMPROMISEbinary download while image expectedoffoffoff
139730MALWARE-CNCWin.Adware.Xiazai outbound connection attemptoffdropdrop
139731FILE-PDFAdobe Reader malformed CID identity-H font file out of bounds read attemptoffdropdrop
139732FILE-PDFAdobe Reader malformed CID identity-H font file out of bounds read attemptoffdropdrop
139733SERVER-WEBAPPInBoundio Marketing for Wordpress plugin PHP file upload attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.