Snort mailing list archives

Snort Subscriber Rules Update 2018-08-23


From: Research via Snort-sigs <snort-sigs () lists snort org>
Date: Thu, 23 Aug 2018 19:31:28 GMT

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting Apache Struts.

Details:
A coding deficiency exists in Apache Struts that may lead to remote
code execution.  Reference:
https://cwiki.apache.org/confluence/display/WW/S2-057

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with GID 1, SIDs 29639, 39190 through
39191 and 47634.

For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=ktWe
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: