Rule Update
24-020 (April 16, 2024)
Publish date: April 16, 2024
DESCRIPTION
* indicates a new version of an existing rule
Deep Packet Inspection Rules:
Arcserve Unified Data Protection
1012012 - Arcserve Unified Data Protection Directory Traversal Vulnerability (CVE-2024-0800)
DCERPC Services
1002937* - Integer Overflow In IPP Service Vulnerability
1003824* - License Logging Server Heap Overflow Vulnerability
1003015* - Microsoft SMB Credential Reflection Vulnerability
1002931* - Microsoft Windows SMB Buffer Underflow Vulnerability
1008445* - Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)
1000972* - Microsoft Windows svcctl ChangeServiceConfig2A() Memory Corruption Vulnerability
1003564* - Print Spooler Load Library Vulnerability
1003985* - SMB Memory Corruption Vulnerability
1003979* - SMB Null Pointer Vulnerability
1003978* - SMB Pathname Overflow Vulnerability
1002975* - Server Service Vulnerability (wkssvc)
1003676* - Workstation Service Memory Corruption Vulnerability
DCERPC Services - Client
1004053* - Microsoft Windows CHM Notepad Remote Code Execution
1004094* - SMB Client Memory Allocation Vulnerability
1003973* - SMB Client Pool Corruption Vulnerability
1003980* - SMB Client Race Condition Vulnerability
1004096* - SMB Client Response Parsing Vulnerability
1004095* - SMB Client Transaction Vulnerability
1003014* - SMB Credential Reflection Vulnerability
DNS Client
1003189* - Malware AGENT.BTZ Domain Blocker
1000468* - Microsoft Word Malformed Object Pointer Remote Code Execution
1003133* - Pointer Reference Memory Corruption Vulnerability Domain Blocker
Telnet Client
1003687* - Telnet Credential Reflection Vulnerability
Trend Micro Mobile Security Server
1011957* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41176)
1011964* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41177)
1011963* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41178)
Web Application Common
1010344* - ThinkPHP Remote Code Execution Vulnerability (CVE-2019-9082 and CVE-2018-20062)
Web Application PHP Based
1012015 - Joomla! CMS Cross-Site Scripting Vulnerability (CVE-2024-21726)
Web Application Tomcat
1012016 - Bonita Authorization Bypass Vulnerability (CVE-2022-25237)
Web Server HTTPS
1011953* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52327)
1011952* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52328)
1011951* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52330)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1008619* - Application - Docker
Deep Packet Inspection Rules:
Arcserve Unified Data Protection
1012012 - Arcserve Unified Data Protection Directory Traversal Vulnerability (CVE-2024-0800)
DCERPC Services
1002937* - Integer Overflow In IPP Service Vulnerability
1003824* - License Logging Server Heap Overflow Vulnerability
1003015* - Microsoft SMB Credential Reflection Vulnerability
1002931* - Microsoft Windows SMB Buffer Underflow Vulnerability
1008445* - Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)
1000972* - Microsoft Windows svcctl ChangeServiceConfig2A() Memory Corruption Vulnerability
1003564* - Print Spooler Load Library Vulnerability
1003985* - SMB Memory Corruption Vulnerability
1003979* - SMB Null Pointer Vulnerability
1003978* - SMB Pathname Overflow Vulnerability
1002975* - Server Service Vulnerability (wkssvc)
1003676* - Workstation Service Memory Corruption Vulnerability
DCERPC Services - Client
1004053* - Microsoft Windows CHM Notepad Remote Code Execution
1004094* - SMB Client Memory Allocation Vulnerability
1003973* - SMB Client Pool Corruption Vulnerability
1003980* - SMB Client Race Condition Vulnerability
1004096* - SMB Client Response Parsing Vulnerability
1004095* - SMB Client Transaction Vulnerability
1003014* - SMB Credential Reflection Vulnerability
DNS Client
1003189* - Malware AGENT.BTZ Domain Blocker
1000468* - Microsoft Word Malformed Object Pointer Remote Code Execution
1003133* - Pointer Reference Memory Corruption Vulnerability Domain Blocker
Telnet Client
1003687* - Telnet Credential Reflection Vulnerability
Trend Micro Mobile Security Server
1011957* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41176)
1011964* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41177)
1011963* - Trend Micro Mobile Security Server Cross-Site Scripting Vulnerability (CVE-2023-41178)
Web Application Common
1010344* - ThinkPHP Remote Code Execution Vulnerability (CVE-2019-9082 and CVE-2018-20062)
Web Application PHP Based
1012015 - Joomla! CMS Cross-Site Scripting Vulnerability (CVE-2024-21726)
Web Application Tomcat
1012016 - Bonita Authorization Bypass Vulnerability (CVE-2022-25237)
Web Server HTTPS
1011953* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52327)
1011952* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52328)
1011951* - Trend Micro Apex Central Cross-Site Scripting Vulnerability (CVE-2023-52330)
Integrity Monitoring Rules:
There are no new or updated Integrity Monitoring Rules in this Security Update.
Log Inspection Rules:
1008619* - Application - Docker
Featured Stories
- The Mirage of AI Programming: Hallucinations and Code IntegrityThe adoption of large language models (LLMs) and Generative Pre-trained Transformers (GPTs), such as ChatGPT, by leading firms like Microsoft, Nuance, Mix and Google CCAI Insights, drives the industry towards a series of transformative changes. As the use of these new technologies becomes prevalent, it is important to understand their key behavior, advantages, and the risks they present.Read more
- Open RAN: Attack of the xAppsThis article discusses two O-RAN vulnerabilities that attackers can exploit. One vulnerability stems from insufficient access control, and the other arises from faulty message handlingRead more
- A Closer Exploration of Residential Proxies and CAPTCHA-Breaking ServicesThis article, the final part of a two-part series, focuses on the details of our technical findings and analyses of select residential proxies and CAPTCHA-solving services.Read more
- How Residential Proxies and CAPTCHA-Solving Services Become Agents of AbuseThis article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.Read more