Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-04-04

This SRU number: 2017-04-03-002
Previous SRU number: 2017-03-30-001

Applies to:

This SEU number: 1645
Previous SEU: 1640

Applies to:

This is the complete list of rules modified in SRU 2017-04-03-002 and SEU 1645.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

Updated Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
11225X11MIT Magic Cookie detectedoffoffoff
11390INDICATOR-SHELLCODEx86 inc ebx NOOPoffoffoff
138993SQLuse of sleep function in HTTP header - likely SQL injection attemptoffdropdrop
141335MALWARE-CNCWin.Trojan.Locky variant outbound connection attemptoffdropdrop
141424MALWARE-CNCWin.Trojan.Cerber outbound connection attemptoffdropdrop
141783EXPLOIT-KITRig exploit kit URL outbound communicationoffdropdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
141771MALWARE-TOOLSslowhttptest DoS tool offdropdrop