Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-05-02

This SRU number: 2017-05-01-002
Previous SRU number: 2017-04-26-001

Applies to:

This SEU number: 1665
Previous SEU: 1663

Applies to:

This is the complete list of rules added in SRU 2017-05-01-002 and SEU 1665.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142403SERVER-WEBAPPTrend Micro Threat Discovery Appliance cache_id command injection attemptoffoffdrop
142404SERVER-WEBAPPTrend Micro Threat Discovery Appliance cache_id command injection attemptoffoffdrop
142405SERVER-WEBAPPTrend Micro Threat Discovery Appliance cache_id command injection attemptoffoffdrop
142406SERVER-WEBAPPWePresent WiPG admin backdoor login attemptoffoffdrop
142407SERVER-WEBAPPWePresent WiPG rdfs.cgi command injection attemptoffoffdrop
142408SERVER-WEBAPPWePresent WiPG rdfs.cgi command injection attemptoffoffdrop
142409SERVER-WEBAPPWePresent WiPG rdfs.cgi command injection attemptoffoffdrop
142410SERVER-WEBAPPWePresent WiPG rdtool backdoor login attemptoffoffdrop
142411SERVER-WEBAPPWePresent WiPG session id check bypass attemptoffoffdrop
142414FILE-PDFAdobe PDF JavaScript engine use after free memory corruption attemptoffoffdrop
142415FILE-PDFAdobe PDF JavaScript engine use after free memory corruption attemptoffoffdrop
142416BROWSER-IEMicrosoft Internet Explorer IE11 memory corruption attemptoffoffdrop
142417BROWSER-IEMicrosoft Internet Explorer IE8 mode menu tag out-of-bounds access attemptoffoffdrop
142418FILE-EXECUTABLEWin.Trojan.DoubleAgent download attemptoffoffoff
142419FILE-EXECUTABLEWin.Trojan.DoubleAgent download attemptoffoffoff
142420SERVER-OTHERHP Operations Agent for NonStop server HEALTH packet parsing stack buffer overflow attemptoffoffoff
142421MALWARE-CNCWin.Trojan.Cerber variant inbound connection attemptoffdropdrop
142424POLICY-OTHERMSSQL CLR permission set to unsafe attemptoffoffdrop
142425MALWARE-CNCWin.Trojan.ChChes set cookie tag inbound connectionoffdropdrop
142426SERVER-WEBAPPPhpcms attachment upload SQL injection attemptoffoffdrop
142427SERVER-WEBAPPPhpcms attachment upload SQL injection attemptoffoffdrop
142428SERVER-WEBAPPPhpcms attachment upload SQL injection attemptoffoffdrop
142429SERVER-WEBAPPPhpcms user registration remote file include attemptoffoffdrop
142430SERVER-WEBAPPPhpcms user registration remote file include attemptoffoffdrop
342431SERVER-WEBAPPTRUFFLEHUNTER TALOS-2017-0332 attack attemptoffoffdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
142412FILE-OTHERAdobe Director rcsL chunk parsing denial of service attemptoffoffoff
142413FILE-OTHERAdobe Director rcsL chunk parsing denial of service attemptoffoffoff
142422FILE-OTHERAdobe Director rcsL chunk parsing denial of service attemptoffoffoff
142423FILE-OTHERAdobe Director rcsL chunk parsing denial of service attemptoffoffoff

Updated Rules:

Updated rules can be found at this link.