Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-11-30

This SRU number: 2017-11-30-001
Previous SRU number: 2017-11-28-002

Applies to:

This SEU number: 1765
Previous SEU: 1763

Applies to:

This is the complete list of rules added in SRU 2017-11-30-001 and SEU 1765.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
145050MALWARE-CNCWin.Trojan.IcedId outbound connection attemptoffdropdrop
145051BLACKLISTUser-Agent known malicious user-agent string - WidgiToolbaroffdropdrop
145052SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145053SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145054SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145055SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145056SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145057SERVER-WEBAPPWordpress wpdb SQL injection attemptoffoffdrop
145058FILE-OTHERMicrosoft Windows UAC bypass attemptoffoffoff
145059FILE-OTHERMicrosoft Windows UAC bypass attemptoffoffoff
145060SERVER-WEBAPPpfSense system_groupmanager.php command injection attemptoffoffdrop
145061SERVER-WEBAPPWordpress User History plugin cross site scripting attemptoffoffoff
145062MALWARE-CNCWin.Trojan.Neuron variant inbound service request detected.offdropdrop
145063MALWARE-CNCWin.Trojan.Neuron variant inbound service request detected.offdropdrop
145064MALWARE-CNCWin.Trojan.Neuron variant inbound service request detected.offdropdrop
145065MALWARE-CNCWin.Trojan.Neuron variant inbound service request detected.offdropdrop
145066SERVER-WEBAPPWordPress Duplicator cross site scripting attemptoffoffdrop
145067SERVER-WEBAPPWordPress Duplicator cross site scripting attemptoffoffdrop
145068SERVER-OTHEROracle Identity Manager default login attemptoffoffoff
145069SERVER-SAMBASamba write andx command memory leak attemptoffoffoff
145070SERVER-SAMBASamba write and close command memory leak attemptoffoffoff
145071SERVER-SAMBASamba write and unlock command memory leak attemptoffoffoff
145072SERVER-SAMBASamba write command memory leak attemptoffoffoff
145074SERVER-SAMBASamba unsigned connections attemptoffdropdrop
145075SERVER-WEBAPPWordPress Ultimate Form Builder plugin SQL injection attemptoffdropdrop
145076SERVER-WEBAPPWordPress Ultimate Form Builder plugin SQL injection attemptoffdropdrop
145077SERVER-WEBAPPWordPress Ultimate Form Builder plugin SQL injection attemptoffdropdrop
145078SERVER-WEBAPPTP-Link WR1043ND router cross site request forgery attemptoffoffoff
145079SERVER-WEBAPPTP-Link WR1043ND router cross site request forgery attemptoffoffoff
145080EXPLOIT-KITSundown/Terror malicious flash file load attemptoffoffoff
145081SERVER-OTHERGeutebrueck GCore web server buffer overflow attemptoffoffdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
145073SERVER-WEBAPPWireless IP Camera WIFICAM information leak attemptoffoffdrop

Updated Rules:

Updated rules can be found at this link.