Snort mailing list archives
Snort Subscriber Rules Update 2025-05-13
From: Research via Snort-sigs <snort-sigs () lists snort org>
Date: Tue, 13 May 2025 17:35:44 +0000 (GMT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Talos Snort Subscriber Rules Update Synopsis: Talos is aware of vulnerabilities affecting products from Microsoft Corporation. Details: Microsoft Vulnerability CVE-2025-24063: A coding deficiency exists in Microsoft Kernel Streaming Service Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64848, 1:64849, Snort 3: GID 1, SID 1:301192. Microsoft Vulnerability CVE-2025-29841: A coding deficiency exists in Microsoft Universal Print Management Service that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64850, 1:64851, Snort 3: GID 1, SID 1:301193. Microsoft Vulnerability CVE-2025-29971: A coding deficiency exists in Microsoft Web Threat Defense (WTD.sys) that may lead to denial of service. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64852, 1:64853, Snort 3: GID 1, SID 1:64852, 1:64853. Microsoft Vulnerability CVE-2025-30377: A coding deficiency exists in Microsoft Office that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64858, 1:64859, Snort 3: GID 1, SID 1:301196. Microsoft Vulnerability CVE-2025-30386: A coding deficiency exists in Microsoft Office that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64866, 1:64867, Snort 3: GID 1, SID 1:301200. Microsoft Vulnerability CVE-2025-30388: A coding deficiency exists in Microsoft Windows Graphics Component that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64854, 1:64855, Snort 3: GID 1, SID 1:301194. Microsoft Vulnerability CVE-2025-30397: A coding deficiency exists in Microsoft Scripting Engine Memory Corruption Vulnerability that may lead to remote code execution. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64856, 1:64857, Snort 3: GID 1, SID 1:301195. Microsoft Vulnerability CVE-2025-30400: A coding deficiency exists in Microsoft DWM Core Library that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64862, 1:64863, Snort 3: GID 1, SID 1:301198. Microsoft Vulnerability CVE-2025-32701: A coding deficiency exists in Microsoft Windows Common Log File System Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64864, 1:64865, Snort 3: GID 1, SID 1:301199. Microsoft Vulnerability CVE-2025-32706: A coding deficiency exists in Microsoft Windows Common Log File System Driver that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64860, 1:64861, Snort 3: GID 1, SID 1:301197. Microsoft Vulnerability CVE-2025-32709: A coding deficiency exists in Microsoft Windows Ancillary Function Driver for WinSock that may lead to an escalation of privilege. Rules to detect attacks targeting these vulnerabilities are included in this release and are identified with: Snort 2: GID 1, SID 1:64882, 1:64883, Snort 3: GID 1, SID 1:301203. Talos has added and modified multiple rules in the browser-ie, file-image, file-office, malware-cnc, malware-other, os-windows and server-webapp rule sets to provide coverage for emerging threats from these technologies. For a complete list of new and modified rules please see: https://www.snort.org/advisories -----BEGIN PGP SIGNATURE----- iQIcBAEBAgAGBQJoI4LvAAoJEHB/DbSAg2dxT7wQAIJKftA4bNWQ7mEVW/0IFcvK DP+8QyIqsqPzgX03N8E1VwTo12pNfjCW5UbNja2rWbkISKtrYMtM0tl8Hx2y4c4C NLdJq9r4zbXDmTahIXAf7NJCnX94NOUt+tlW8AaPiB7+uvyvYNmLvbsIuEa9CuuX 6hkz+Ba45XbTFREgp64q0hGuFcPhwMdZxcPToHOo+UIrh5dqOasB7qSei1oa2O1o MZ1KRsD15lbyiw2XuH/UNzbigOxMyT4cm8U+Bnx5isJmorr4ssc596nDYNmuR/4O GdtGTamWoBe7GsK5C19Py9977JCpxOjLCVvgmd9ZVAcXAnPgg/o/tSIO2KGSUfXb X8XeU/mcsmmzMZlY5nrIGRR1HE8s76l0CqmzXJBTiFy5aoKU0gRERSWJGgWd8LXt 7ZD0laegOcy1DCLOUrChj9MyPdliYTQLvd4P5M0FlSx6z8zzhDP3/d9TsN0tPtgi CPIWv+2JE2K17J160y6+chaRgEQXhBza/doxtpqV7qvZprgROajxcvqzxsbDVQH1 t7pBgjD7U+8e1sguixS8qS2y2G5CjN66gLDv6DV3bvceseKkn02pu0b50oWj7YP8 9kmEUKR/OUvHQFlEVratv7q7kVVAYZaqoAGVx3bfjRVjB94AfotlAloL/q3wOpB3 L2TD1rxwd8L3f/YbYrh4 =GAnS -----END PGP SIGNATURE----- _______________________________________________ Snort-sigs mailing list Snort-sigs () lists snort org https://lists.snort.org/mailman/listinfo/snort-sigs Please visit http://blog.snort.org for the latest news about Snort! Please follow these rules: https://snort.org/faq/what-is-the-mailing-list-etiquette Visit the Snort.org to subscribe to the official Snort ruleset, make sure to stay up to date to catch the most <a href=" https://snort.org/downloads/#rule-downloads">emerging threats</a>!
Current thread:
- Snort Subscriber Rules Update 2025-05-13 Research via Snort-sigs (May 13)
