Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-04-11

This SRU number: 2017-04-11-001
Previous SRU number: 2017-04-06-001

Applies to:

This SEU number: 1650
Previous SEU: 1648

Applies to:

This is the complete list of rules added in SRU 2017-04-11-001 and SEU 1650.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142148FILE-OTHERMicrosoft Windows ATMFD font driver malformed OTF file out-of-bounds memory access attemptoffdropdrop
142149FILE-OTHERMicrosoft Windows ATMFD font driver malformed OTF file out-of-bounds memory access attemptoffdropdrop
142150FILE-OTHERMicrosoft Windows ATMFD font driver malformed OTF file out-of-bounds memory access attemptoffdropdrop
142151FILE-OTHERMicrosoft Windows ATMFD font driver malformed OTF file out-of-bounds memory access attemptoffdropdrop
142152BROWSER-IEMicrosoft Edge JavaScript string object type confusion attemptoffdropdrop
142153BROWSER-IEMicrosoft Edge JavaScript string object type confusion attemptoffdropdrop
142154OS-WINDOWSMicrosoft Windows win32k information disclosure attemptoffoffdrop
142155OS-WINDOWSMicrosoft Windows win32k information disclosure attemptoffoffdrop
142156BROWSER-IEMicrosoft Internet Explorer recordset use after free attemptoffdropdrop
142157BROWSER-IEMicrosoft Internet Explorer recordset use after free attemptoffdropdrop
142158OS-WINDOWSMicrosoft Win32k privilege escalation attemptoffdropdrop
142159OS-WINDOWSMicrosoft Win32k privilege escalation attemptoffdropdrop
142160SERVER-OTHERMicrosoft LDAP MaxBuffSize buffer overflow attemptoffdropdrop
142161FILE-OFFICEMicrosoft Office Excel out of bounds memory attemptoffdropdrop
142162FILE-OFFICEMicrosoft Office Excel out of bounds memory attemptoffdropdrop
142163FILE-OTHERMicrosoft Office OneNote 2007 dll-load exploit attemptoffoffoff
142164FILE-OTHERMicrosoft Office OneNote 2007 dll-load exploit attemptoffoffoff
142165BROWSER-IEMicrosoft Internet Explorer type confusion vulnerability attemptoffdropdrop
142166BROWSER-IEMicrosoft Internet Explorer type confusion vulnerability attemptoffdropdrop
142167FILE-OFFICEMicrosoft Office custom message class security bypass attemptoffdropdrop
142168FILE-OFFICEMicrosoft Office custom message class security bypass attemptoffdropdrop
142169BROWSER-IEMicrosoft Internet Explorer classid remote code execution attemptoffoffoff
142170BROWSER-IEMicrosoft Internet Explorer classid remote code execution attemptoffoffoff
142171MALWARE-CNCWin.Downloader.Agent variant outbound connectionoffdropdrop
142172MALWARE-CNCWin.Downloader.Agent variant certificate negotiationoffdropdrop
142173OS-WINDOWSMicrosoft GDI PolyTextOutW out of bounds memory write attemptoffdropdrop
142174OS-WINDOWSMicrosoft GDI PolyTextOutW out of bounds memory write attemptoffdropdrop
142175FILE-PDFAdobe Reader JavaScript API documentToStream use after free attemptoffdropdrop
142176FILE-PDFAdobe Reader JavaScript API documentToStream use after free attemptoffdropdrop
342177FILE-OTHERTRUFFLEHUNTER TALOS-2017-0310 attack attemptoffdropdrop
342178FILE-OTHERTRUFFLEHUNTER TALOS-2017-0310 attack attemptoffdropdrop
342179FILE-IMAGETRUFFLEHUNTER TALOS-2017-2811 attack attemptoffoffdrop
342180FILE-IMAGETRUFFLEHUNTER TALOS-2017-2811 attack attemptoffoffdrop
142183BROWSER-IEMicrosoft Edge format rendering type confusion attemptoffdropdrop
142184BROWSER-IEMicrosoft Edge format rendering type confusion attemptoffdropdrop
142185OS-WINDOWSMicrosoft Windows WMI DCOM arbitrary .NET serialization code execution attemptoffdropdrop
142186OS-WINDOWSMicrosoft Windows WMI DCOM arbitrary .NET serialization code execution attemptoffdropdrop
142187OS-WINDOWSMicrosoft Windows IE ETW Collector Service privilege escalation attemptoffdropdrop
142188OS-WINDOWSMicrosoft Windows IE ETW Collector Service privilege escalation attemptoffdropdrop
342191FILE-IMAGETRUFFLEHUNTER TALOS-2017-0309 attack attemptoffoffdrop
342192FILE-IMAGETRUFFLEHUNTER TALOS-2017-0309 attack attemptoffoffdrop
342193FILE-IMAGETRUFFLEHUNTER TALOS-2017-0309 attack attemptoffoffdrop
342194FILE-IMAGETRUFFLEHUNTER TALOS-2017-0309 attack attemptoffoffdrop
342195FILE-OTHERTRUFFLEHUNTER TALOS-2017-0307 attack attemptoffdropdrop
342196FILE-OTHERTRUFFLEHUNTER TALOS-2017-0307 attack attemptoffdropdrop
142197FILE-OFFICEMicrosoft Office mqrt.dll dll-load exploit attemptoffdropdrop
142198FILE-OFFICEMicrosoft Office mqrt.dll dll-load exploit attemptoffdropdrop
142199OS-WINDOWSMicrosoft Windows GDI null pointer dereference attemptoffdropdrop
142200OS-WINDOWSMicrosoft Windows GDI null pointer dereference attemptoffdropdrop
142201BROWSER-IEMicrosoft Internet Explorer CTreePos type confusion attemptoffdropdrop
142202FILE-PDFAdobe Reader JavaScript string from stream memory corruption attemptoffdropdrop
142203FILE-PDFAdobe Reader JavaScript string from stream memory corruption attemptoffdropdrop
142204BROWSER-IEMicrosoft Internet Explorer htmlFile ActiveX control universal XSS attemptoffdropdrop
142205BROWSER-IEMicrosoft Internet Explorer htmlFile ActiveX control universal XSS attemptoffdropdrop
142206FILE-FLASHAdobe Flash Player allocator use-after-free attemptoffdropdrop
142207FILE-FLASHAdobe Flash Player allocator use-after-free attemptoffdropdrop
142208OS-WINDOWSMicrosoft Windows Clipboard Broker privilege escalation vulnerability attemptoffdropdrop
142209OS-WINDOWSMicrosoft Windows Clipboard Broker privilege escalation vulnerability attemptoffdropdrop
142210BROWSER-IEMicrosoft Edge xlink type confusion memory corruption attemptoffdropdrop
142211BROWSER-IEMicrosoft Edge xlink type confusion memory corruption attemptoffdropdrop
142212FILE-PDFAdobe Acrobat Reader embedded JPEG 2000 flst heap overflow attemptoffdropdrop
142213FILE-PDFAdobe Acrobat Reader embedded JPEG 2000 flst heap overflow attemptoffdropdrop
142214FILE-FLASHAdobe Flash Player NetStream use after free attemptoffdropdrop
142215FILE-FLASHAdobe Flash Player NetStream use after free attemptoffdropdrop
142216FILE-OTHERAdobe Acrobat Reader pcx planes memory corruption attemptoffoffdrop
142217FILE-OTHERAdobe Acrobat Reader pcx planes memory corruption attemptoffoffdrop
142218FILE-IMAGEAdobe Acrobat Pro malformed GIF memory corruption attemptoffdropdrop
142219FILE-IMAGEAdobe Acrobat Pro malformed TIF memory corruption attemptoffdropdrop
142220SERVER-WEBAPPBlueCoat CAS report-email command injection attemptoffoffdrop
Low Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142181DELETEDgyEMoybvxbllnqLg0n4E
142182DELETEDesjQk5MDxNnLLZ57GfDW
142189FILE-OFFICERTF objautlink url moniker file download attemptoffoffdrop
142190FILE-OFFICERTF objautlink url moniker file download attemptoffoffdrop

Updated Rules:

Updated rules can be found at this link.