Snort mailing list archives

Snort Subscriber Rules Update 2025-01-14


From: Research via Snort-sigs <snort-sigs () lists snort org>
Date: Tue, 14 Jan 2025 20:40:28 +0000 (GMT)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Talos Snort Subscriber Rules Update

Synopsis:
Talos is aware of vulnerabilities affecting products from Microsoft
Corporation.

Details:
Microsoft Vulnerability CVE-2025-21189:
A coding deficiency exists in Microsoft MapUrlToZone that may lead to
security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64454 through 64455,
Snort 3: GID 1, SID 301122.

Microsoft Vulnerability CVE-2025-21219:
A coding deficiency exists in Microsoft MapUrlToZone that may lead to
security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64456 through 64457,
Snort 3: GID 1, SID 301123.

Microsoft Vulnerability CVE-2025-21269:
A coding deficiency exists in Microsoft Windows HTML Platforms that may
lead to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64452 through 64453,
Snort 3: GID 1, SID 301121.

Microsoft Vulnerability CVE-2025-21292:
A coding deficiency exists in Microsoft Windows Search Service that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64448 through 64449,
Snort 3: GID 1, SID 301119.

Microsoft Vulnerability CVE-2025-21299:
A coding deficiency exists in Microsoft Windows Kerberos that may lead
to security feature bypass.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64446 through 64447,
Snort 3: GID 1, SID 301118.

Microsoft Vulnerability CVE-2025-21309:
A coding deficiency exists in Microsoft Windows Remote Desktop Services
that may lead to remote code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SID 64432,
Snort 3: GID 1, SID 64432.

Microsoft Vulnerability CVE-2025-21315:
A coding deficiency exists in Microsoft Brokering File System that may
lead to an escalation of privilege.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64450 through 64451,
Snort 3: GID 1, SID 301120.

Microsoft Vulnerability CVE-2025-21354:
A coding deficiency exists in Microsoft Excel that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64444 through 64445,
Snort 3: GID 1, SID 301117.

Microsoft Vulnerability CVE-2025-21362:
A coding deficiency exists in Microsoft Excel that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64435 through 64436,
Snort 3: GID 1, SID 301114.

Microsoft Vulnerability CVE-2025-21365:
A coding deficiency exists in Microsoft Office that may lead to remote
code execution.

Rules to detect attacks targeting these vulnerabilities are included in
this release and are identified with:
Snort 2: GID 1, SIDs 64433 through 64434,
Snort 3: GID 1, SID 301113.

Talos has added and modified multiple rules in the file-office,
file-other, malware-cnc, malware-other, os-windows and server-webapp
rule sets to provide coverage for emerging threats from these
technologies.


For a complete list of new and modified rules please see:

https://www.snort.org/advisories
-----BEGIN PGP SIGNATURE-----
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=/tk4
-----END PGP SIGNATURE-----

_______________________________________________
Snort-sigs mailing list
Snort-sigs () lists snort org
https://lists.snort.org/mailman/listinfo/snort-sigs

Please visit http://blog.snort.org for the latest news about Snort!

Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette

Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a 
href=" https://snort.org/downloads/#rule-downloads";>emerging threats</a>!


Current thread: