Rule Update
16-016 (May 24, 2016)
Publish date: May 24, 2016
DESCRIPTION
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
DCERPC Services
1007596* - Identified Suspicious File Extension Rename Activity Over Network Share
1007598* - Identified Suspicious Rename Activity Over Network Share
SAP Netweaver Server
1007639 - Identified Unauthorized Access Of Servlets Over Web
Suspicious Client Application Activity
1007578* - Ransomware CryptFile
1007576* - Ransomware Cryptesla
1007579* - Ransomware HTTP Request
1007577* - Ransomware Hydra
1007581* - Ransomware Lectool
1007602* - Ransomware Locky
1007601* - Ransomware TCP Request
Suspicious Server Application Activity
1007580* - Ransomware HTTP Request-1
1007582* - Ransomware Lectool-1
1007533* - Ransomware TCP Request-1
Web Application Common
1007609* - ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714)
Web Application PHP Based
1007641 - Magento Unauthenticated Arbitrary File Write Vulnerability (CVE-2016-4010)
Web Client Common
1007515* - Adobe Flash Player Heap Overflow Vulnerability (CVE-2016-1001)
1007635* - Adobe Flash Player Heap Overflow Vulnerability (CVE-2016-1101)
1007571 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-0997)
1007543 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-0998)
1007541 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-1000)
1007611* - ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714) - 1
1007485* - Microsoft Windows Media Player Parsing Remote Code Execution Vulnerability (CVE-2016-0101)
Web Client Internet Explorer/Edge
1007372* - Microsoft Edge Memory Corruption Vulnerability (CVE-2016-0003)
Web Server Common
1002628* - Adobe RoboHelp Server SQL Injection Vulnerability
Web Server Miscellaneous
1007607* - RedHat JBoss Operations Network ContentManager Remote Code Execution Vulnerability (CVE-2015-0297)
1007606* - RedHat JBoss WildFly Application Server Information Disclosure Vulnerability (CVE-2016-0793)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Deep Packet Inspection Rules:
DCERPC Services
1007596* - Identified Suspicious File Extension Rename Activity Over Network Share
1007598* - Identified Suspicious Rename Activity Over Network Share
SAP Netweaver Server
1007639 - Identified Unauthorized Access Of Servlets Over Web
Suspicious Client Application Activity
1007578* - Ransomware CryptFile
1007576* - Ransomware Cryptesla
1007579* - Ransomware HTTP Request
1007577* - Ransomware Hydra
1007581* - Ransomware Lectool
1007602* - Ransomware Locky
1007601* - Ransomware TCP Request
Suspicious Server Application Activity
1007580* - Ransomware HTTP Request-1
1007582* - Ransomware Lectool-1
1007533* - Ransomware TCP Request-1
Web Application Common
1007609* - ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714)
Web Application PHP Based
1007641 - Magento Unauthenticated Arbitrary File Write Vulnerability (CVE-2016-4010)
Web Client Common
1007515* - Adobe Flash Player Heap Overflow Vulnerability (CVE-2016-1001)
1007635* - Adobe Flash Player Heap Overflow Vulnerability (CVE-2016-1101)
1007571 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-0997)
1007543 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-0998)
1007541 - Adobe Flash Player Use After Free Vulnerability (CVE-2016-1000)
1007611* - ImageMagick Remote Code Execution Vulnerability (CVE-2016-3714) - 1
1007485* - Microsoft Windows Media Player Parsing Remote Code Execution Vulnerability (CVE-2016-0101)
Web Client Internet Explorer/Edge
1007372* - Microsoft Edge Memory Corruption Vulnerability (CVE-2016-0003)
Web Server Common
1002628* - Adobe RoboHelp Server SQL Injection Vulnerability
Web Server Miscellaneous
1007607* - RedHat JBoss Operations Network ContentManager Remote Code Execution Vulnerability (CVE-2015-0297)
1007606* - RedHat JBoss WildFly Application Server Information Disclosure Vulnerability (CVE-2016-0793)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
There are no new or updated Log Inspection Rules in this Security Update.
Featured Stories
- Unveiling AI Agent Vulnerabilities Part V: Securing LLM ServicesTo conclude our series on agentic AI, this article examines emerging vulnerabilities that threaten AI agents, focusing on providing proactive security recommendations on areas such as code execution, data exfiltration, and database access.Read more
- Unveiling AI Agent Vulnerabilities Part IV: Database Access VulnerabilitiesHow can attackers exploit weaknesses in database-enabled AI agents? This research explores how SQL generation vulnerabilities, stored prompt injection, and vector store poisoning can be weaponized by attackers for fraudulent activities.Read more
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more