VRT Advisories

VRT Rules 2012-03-22

Sourcefire VRT Rules Update

Date: 2012-03-22


This release adds and modifies rules in several categories.


Microsoft Security Advisory MS12-020:
Microsoft Windows Remote Desktop suffers from programming errors that may allow a remote attacker to execute code on a vulnerable system.

A rule identified with GID 3, SID 21619 has been added in this release in order to improve detection of attacks and to improve performance.

This rule replaces the rules identified with GID 1, SIDs 21571, 21572 and 21592. These rules have been deleted in this release.

Additionally, the Sourcefire VRT has added and modified multiple rules in the backdoor, chat, dns, dos, exploit, file-identify, imap, misc, netbios, policy, pop3, scada, shellcode, smtp, specific-threats, sql, web-activex, web-client and web-php rule sets to provide coverage for emerging threats from these technologies.

Rule Pack Summary:

For a complete list of new and modified rules, click here.


Sourcefire VRT rule packs often utilize enhancements made to Snort. Operators should upgrade to the latest revision or patch level for Snort to ensure these enhancements are available before using these rules.

About the VRT:

The Sourcefire VRT is a group of leading edge intrusion detection and prevention experts working to proactively discover, assess and respond to the latest trends in hacking activity, intrusion attempts and vulnerabilities. This team is also supported by the vast resources of the open source Snort community, making it the largest group dedicated to advances in the network security industry.

why subscribe? || download rules