Cisco Talos (VRT) Update for Sourcefire 3D System

* Talos combines our security experts from TRAC, SecApps, and VRT teams.

Date: 2017-12-05

This SRU number: 2017-12-04-001
Previous SRU number: 2017-11-30-001

Applies to:

This SEU number: 1766
Previous SEU: 1765

Applies to:

This is the complete list of rules added in SRU 2017-12-04-001 and SEU 1766.

The format of the file is:

GID - SID - Rule Group - Rule Message - Policy State

The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.

The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.

Note: Unless stated explicitly, the rules are for the series of products listed above.

New Rules:

High Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
145083SERVER-APACHEApache Solr RunExecutableListener arbitrary command execution attemptoffoffdrop
145084SERVER-APACHEApache Solr xmlparser external doctype or entity expansion attemptoffoffdrop
145085FILE-FLASHAdobe Flash Player use after free attemptoffoffoff
345086SERVER-WEBAPPTRUFFLEHUNTER TALOS-2017-0494 attack attemptoffoffoff
345087SERVER-WEBAPPTRUFFLEHUNTER TALOS-2017-0495 attack attemptoffoffoff
345088SERVER-WEBAPPTRUFFLEHUNTER TALOS-2017-0502 attack attemptoffoffdrop
345089SERVER-OTHERTRUFFLEHUNTER TALOS-2017-0501 attack attemptoffoffdrop
145090MALWARE-CNCWin.Backdoor.StoneDrill server selection outbound connectionoffdropdrop
145091MALWARE-CNCWin.Backdoor.StoneDrill login outbound connectionoffdropdrop
145092MALWARE-CNCWin.Backdoor.StoneDrill get commands outbound connectionoffdropdrop
145093SERVER-WEBAPPApache Archiva XML server side request forgery attemptoffoffoff
145094SERVER-WEBAPPMediaWiki arbitrary file write attemptoffoffdrop
145095MALWARE-CNCWin.Ransomware.Gibon variant outbound connectionoffdropdrop
145096MALWARE-CNCWin.Ransomware.Gibon variant inbound connectionoffdropdrop
145097MALWARE-CNCWin.Downloader.SnatchLoader variant inbound connectionoffdropdrop
145098MALWARE-CNCWin.Downloader.SnatchLoader variant outbound connectionoffdropdrop
145099MALWARE-CNCWin.Trojan.Syscon variant inbound connectionoffdropdrop
145100MALWARE-CNCWin.Trojan.Syscon variant outbound connectionoffdropdrop
345102FILE-PDFTRUFFLEHUNTER TALOS-2017-0505 attack attemptoffoffdrop
345103FILE-PDFTRUFFLEHUNTER TALOS-2017-0505 attack attemptoffoffdrop
145104MALWARE-CNCWin.Malware.Recam variant outbound connectionoffoffdrop
345105FILE-PDFTRUFFLEHUNTER TALOS-2017-0504 attack attemptoffoffdrop
345106FILE-PDFTRUFFLEHUNTER TALOS-2017-0504 attack attemptoffoffdrop
Medium Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
145082SERVER-WEBAPPRuby on Rails log file manipulation attemptoffoffoff
145101PROTOCOL-SCADAvxworks rpc credential flavor integer overflow device crash attemptoffoffoff
Low Priority
GIDSIDRule GroupRule MessagePolicy State
Con.Bal.Sec.
144867DELETEDqYHcy2wy7PRGLrt918ZR
144868DELETEDttP2cWhxHiaW4S7ZGfi6
144869DELETEDrZWXwyJ8bPnkrEyUfMbl
144870DELETEDMzxoBYWaxvjLcsmkxZjK

Updated Rules:

Updated rules can be found at this link.