Snort mailing list archives
Snort Subscriber Rules Update 2024-08-13
From: Research via Snort-sigs <snort-sigs () lists snort org>
Date: Tue, 13 Aug 2024 18:55:13 GMT
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2024-38106: A coding deficiency exists in Microsoft Windows Kernel that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63866 through 63867, Snort 3: GID 1, SID 300983. Microsoft Vulnerability CVE-2024-38125: A coding deficiency exists in Microsoft Kernel Streaming WOW Thunk Service Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63872 through 63873, Snort 3: GID 1, SID 300986. Microsoft Vulnerability CVE-2024-38141: A coding deficiency exists in Microsoft Windows Ancillary Function Driver for WinSock that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63858 through 63859, Snort 3: GID 1, SID 300980. Microsoft Vulnerability CVE-2024-38144: A coding deficiency exists in Microsoft Kernel Streaming WOW Thunk Service Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63860 through 63861, Snort 3: GID 1, SID 300981. Microsoft Vulnerability CVE-2024-38147: A coding deficiency exists in Microsoft DWM Core Library that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63868 through 63869, Snort 3: GID 1, SID 300984. Microsoft Vulnerability CVE-2024-38148: A coding deficiency exists in Microsoft Windows Secure Channel that may lead to denial of service. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 63878, Snort 3: GID 1, SID 63878. Microsoft Vulnerability CVE-2024-38150: A coding deficiency exists in Microsoft Windows DWM Core Library that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63876 through 63877, Snort 3: GID 1, SID 300988. Microsoft Vulnerability CVE-2024-38178: A coding deficiency exists in Microsoft Scripting Engine Memory Corruption Vulnerability that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63864 through 63865, Snort 3: GID 1, SID 300982. Microsoft Vulnerability CVE-2024-38193: A coding deficiency exists in Microsoft Windows Ancillary Function Driver for WinSock that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63870 through 63871, Snort 3: GID 1, SID 300985. Microsoft Vulnerability CVE-2024-38196: A coding deficiency exists in Microsoft Windows Common Log File System Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 63874 through 63875, Snort 3: GID 1, SID 300987. Talos also has added and modified multiple rules in the browser-ie, file-pdf, malware-cnc, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJmu6wQAAoJEMzg39Iewam/4eIP/3guPcAJ6mhkJn6D3xUKvn9J vqn6Rx1ggJMq+n4WcHAhNzzpEhmfczBsaFD6tTAs3lNkNv7gXWVjGUQHj/wDA6e1 R4MenEf3TAvUaWMSQSefTEXuPqdssfyL/C+6Iu5pOxkqdoOvF0e1IrexXznmAr44 NrmNcl4JEyqfO4c/g5bCAOruPr855dr0g97TnDmK7Yyh3ab6IvcXE7mKUFOj8TLq pVl12I9xvGSpH9bPW9TLac0Fn8X+JM9HCY/6nW4VQde84RC8F4KAl6qjvab8Nuuy ypclM+AsScscKVhHp+jj9hOkMEp/xTJX1GjL9wNYkycr8cDm9DxFFC3sbZ07j5zu HyJOHkAEtchuscT2zey6HfEHPXxr/3eJCHD5g46OENv7TrSIeEwT1+NWzdGQQap9 oa4MswclL1m5yxnk4k+PsqdBAX9WHoxhT8Fv1WqUqEWQkK4YAD6Ex1jjqtdrbBdH dMmpExDsiU55LQKDoNWY2VLjJmjEt/TSSYh1TZ0fQR/AWu3aZ7GE4AKQz74NvQnR vjgN8N2ByB7vdX+NTm1ixcNbs48ISL3HQG3Tbf26yN5agxJ7GQd+E34W9oesVmM2 yArk17nOkwj1t3+ePm1vxXdP4xDqcKkFsoS1vjVVb815DU8Z7CTEK92PE8TUcYdP 9eSF3OLtMr3MNUXgJC57 =v4H7 -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2024-08-13 Research via Snort-sigs (Aug 13)
