Snort mailing list archives
Snort Subscriber Rules Update 2024-11-12
From: Research via Snort-sigs <snort-sigs () lists snort org>
Date: Tue, 12 Nov 2024 22:16:51 +0000 (GMT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2024-43451: A coding deficiency exists in Microsoft Windows SmartScreen that may lead to spoofing. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 62022 through 62023, Snort 3: GID 1, SID 300612. Microsoft Vulnerability CVE-2024-43623: A coding deficiency exists in Microsoft Windows NT OS Kernel that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64219 through 64220, Snort 3: GID 1, SID 301064. Microsoft Vulnerability CVE-2024-43629: A coding deficiency exists in Microsoft Windows DWM Core Library that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64221 through 64222, Snort 3: GID 1, SID 301065. Microsoft Vulnerability CVE-2024-43630: A coding deficiency exists in Microsoft Windows Kernel that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64223 through 64224, Snort 3: GID 1, SID 301066. Microsoft Vulnerability CVE-2024-43642: A coding deficiency exists in Microsoft Windows SMB that may lead to denial of service. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 64234, Snort 3: GID 1, SID 64234. Microsoft Vulnerability CVE-2024-49019: A coding deficiency exists in Microsoft Active Directory Certificate Services that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 64218, Snort 3: GID 1, SID 64218. Microsoft Vulnerability CVE-2024-49033: A coding deficiency exists in Microsoft Word that may lead to security feature bypass. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 64229, Snort 3: GID 1, SID 64229. Microsoft Vulnerability CVE-2024-49039: A coding deficiency exists in Microsoft Windows Task Scheduler that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SIDs 64232 through 64233, Snort 3: GID 1, SID 301073. Talos has added and modified multiple rules in the malware-cnc, malware-other, os-other, os-windows, protocol-tftp and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJnM9PSAAoJEMzg39Iewam/F/UP/3gGLCQjgiRgXD0L/Dh4MhOL paTdwW1mpt730gisUx8NBrAOGJeaMjqbMCnKB8KwiFGjd/zdNhweLbFqSV7PbFFa 1BQctDv5xYH2Tpn1gB9xAl6aT7SVvmLEio99yZMh3v0k+rnJgEkaOrHyMZ2oQcEB o0AdsXxYTNg9tTBxkZjOf2Dj+TrrMeIGvbLkSz9xnEe43jDCm9I15drFVts2VbAm lu1MM4DMxXtamavw1jDFLPKRlD+OqUIfAh+wYFO4Hg2bSvpV3hYmcr9rIF5DPZ7b XhoTntMM7ksJgYrmbZCfwzoICFKENZrd9oogGZH5CnJZqUuPqpi6ciHqmBFpN63w pfl6gI9rmxYmla3iFPrUzI9jmnWquMdngbn+HnEYtAYMhGFDcoHsm1esgH2pBGJb 6kihRypgYuHsvCmt6p6PGgDGPhM6HQkaxIYvd0TBiay98vEZvh3F4zUAc38DU9iX Hh8//so67q5f4/aIuGfrfGX/EVJ7q0vGjeiHf1HXecpjkPp63p70iYB+u3xavbDV nUEFVE8xXHpiZ6Na/Ak/W648eOaDyR85rHZRSIICe9uor5b7PPGL16aI1Oll7jMk XB/uH/GyRGk+WDuBz/ObG2Y0x270RapH505i9bbkA09FIexmWXvNWEe3Dg8KIXjk 9hWziNkfKmQ8HnC31T+s =/Rzc -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2024-11-12 Research via Snort-sigs (Nov 12)
