Snort mailing list archives

Re: Shellshock CVE 2014-6271


From: Alex McDonnell <amcdonnell () sourcefire com>
Date: Thu, 9 Oct 2014 12:10:15 -0400

Just confirmed that is not the case. The rules are still part of our
ruleset. They were even put into community so that free subscribers
wouldn't have to wait 30 days.

Alex McDonnell
TALOS Response Team Lead

On Thu, Oct 9, 2014 at 11:44 AM, Lukas Matt <lukas.matt () sophos com> wrote:

 Hi,

just updated the IPS pattern and recognized that you removed the
Shellshock rules.
I was not able to find a explanation on your homepage. Were they too noisy?

Regards

--
  Lukas Matt
Deep Packet Inspection Developer, SophosLabs
O: (+49) 721-25516-322 / M: (+49) 174-3440-555


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer

http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists sourceforge net
https://lists.sourceforge.net/lists/listinfo/snort-sigs
http://www.snort.org


Please visit http://blog.snort.org for the latest news about Snort!

Current thread: