* Talos combines our security experts from TRAC, SecApps, and VRT teams.
This SRU number: 2016-09-21-001
Previous SRU number: 2016-09-19-001
Applies to:
This SEU number: 1548
Previous SEU: 1547
Applies to:
This is the complete list of rules added in SRU 2016-09-21-001 and SEU 1548.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
GID | SID | Rule Group | Rule Message | Policy State | ||
---|---|---|---|---|---|---|
Con. | Bal. | Sec. | ||||
1 | 40253 | SERVER-MYSQL | Multiple SQL products privilege escalation attempt | off | off | drop |
1 | 40254 | SERVER-MYSQL | Multiple SQL products privilege escalation attempt | off | off | drop |
1 | 40255 | SERVER-WEBAPP | FreePBX Music Module ajax.php command injection attempt | off | off | drop |
1 | 40256 | SERVER-WEBAPP | Idera Up.Time Monitoring Station post2file.php arbitrary PHP file upload attempt | off | off | off |
3 | 40257 | SERVER-WEBAPP | Cisco Cloud Services Platform dnslookup command injection attempt | off | off | drop |
1 | 40258 | MALWARE-CNC | Osx.Trojan.Keydnap variant backdoor detected | off | drop | drop |
1 | 40259 | MALWARE-CNC | Osx.Trojan.Keydnap variant backdoor detected | off | drop | drop |
1 | 40260 | MALWARE-CNC | Osx.Trojan.Keydnap variant initial backdoor download attempt | off | drop | drop |
1 | 40261 | MALWARE-CNC | Osx.Trojan.Keydnap variant backdoor detected | off | drop | drop |
1 | 40262 | MALWARE-CNC | Osx.Trojan.Keydnap variant backdoor detected | off | drop | drop |
1 | 40263 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40264 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40265 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40266 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40267 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40268 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40269 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40270 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40271 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40272 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40273 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
1 | 40274 | MALWARE-CNC | Osx.Trojan.Keydnap variant dropper detected | off | drop | drop |
3 | 40275 | SERVER-WEBAPP | Cisco ESA internal testing interface access attempt | drop | drop | drop |
Updated rules can be found at this link.