Descrizione

* indicates a new version of an existing rule

Deep Packet Inspection Rules:

DCERPC Services
1009490* - Block Administrative Share - 1 (ATT&CK T1077,T1105)
1005293* - Prevent Windows Administrator User Login Over SMB (ATT&CK T1077)


DNS Client
1003328* - Disallow Intra-Site Automatic Tunnel Addressing Protocol


Suspicious Server Application Activity
1009549* - Detected Terminal Services (RDP) Server Traffic - 1 (ATT&CK T1015,T1043,T1076,T1048,T1032,T1071)


Web Application Tomcat
1009697* - Apache Tomcat Remote Code Execution Vulnerability (CVE-2019-0232)


Web Client Common
1008206* - ImageMagick 'coders/rle.c' Remote Buffer Overflow Vulnerability (CVE-2016-10049) - 1
1010053 - Microsoft Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1358)
1010054 - Microsoft Jet Database Engine Remote Code Execution Vulnerability (CVE-2019-1359)
1010052 - Microsoft Windows Imaging API Remote Code Execution Vulnerability (CVE-2019-1311)


Web Client Internet Explorer/Edge
1010050 - Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability (CVE-2019-1429)
1010051 - Microsoft Internet Explorer VBScript Remote Code Execution Vulnerability (CVE-2019-1390)


Web Server HTTPS
1010049 - Apache Traffic Server HTTP/2 Denial Of Service Vulnerability (CVE-2019-9515)


Web Server Miscellaneous
1005604* - Apache Struts Multiple Remote Command Execution Vulnerability
1005509* - nginx "ngx_http_parse_chunked()" Buffer Overflow Vulnerability


Windows Services RPC Client DCERPC
1008477* - Identified Usage Of WMI Execute Methods - Client (ATT&CK T1047)


Windows Services RPC Server DCERPC
1009480* - Identified WMI Query Over DCE/RPC Protocol (ATT&CK T1005)


Integrity Monitoring Rules:

1005645* - Microsoft Windows - AutoRun Registry Entries Modified (ATT&CK T1013, T1060)
1002776* - Microsoft Windows - Startup Programs Modified (ATT&CK T1112, T1060)


Log Inspection Rules:

There are no new or updated Log Inspection Rules in this Security Update.