Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2016-12-22

This SRU number: 2016-12-21-001
Previous SRU number: 2016-12-19-001

Applies to:

This SEU number: 1589
Previous SEU: 1588

Applies to:

This is the complete list of rules added in SRU 2016-12-21-001 and SEU 1589.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
141083BLACKLISTsuspicious .bit dns queryoffdropdrop
141084EXPLOIT-KITSundown Exploit kit landing page obfuscation detectedoffoffdrop
341085SERVER-WEBAPPTRUFFLEHUNTER TALOS-2016-0235 attack attemptoffoffdrop
141086SERVER-WEBAPPOracle Opera Property Management System ProcessInfo command injection attemptoffdropdrop
141087SERVER-WEBAPPOracle Opera Property Management System ProcessInfo command injection attemptoffdropdrop
141088MALWARE-CNCWin.Trojan.MrWhite out bound communication attemptoffdropdrop
141089MALWARE-CNCWin.Trojan.Ostap out bound communication attemptoffdropdrop
141092EXPLOIT-KITRig Exploit Kit landing page obfuscation detectedoffdropdrop
341093POLICY-OTHERDocker management traffic detectedoffoffoff
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
141090SERVER-OTHERRockwell Factorytalk RNADiagReceiver denial of service attemptoffoffoff
141091PROTOCOL-SCADARockwell Controllogix Crash Ethernet attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.