Talos Rules 2019-02-19
This release adds and modifies rules in several categories.

Talos has added and modified multiple rules in the file-flash, file-image, file-office, file-pdf and os-windows rule sets to provide coverage for emerging threats from these technologies.

Change logs

2019-02-19 15:22:04 UTC

Snort Subscriber Rules Update

Date: 2019-02-19

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091200.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:49221 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49220 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49219 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49218 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49217 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49216 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49215 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49214 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49213 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49212 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49211 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49236 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49235 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49234 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49233 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49232 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49231 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49230 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49229 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49228 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49227 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49226 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49225 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49224 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49223 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49222 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)

Modified Rules:


 * 1:31033 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Cryptodefence variant outbound connection (malware-cnc.rules)
 * 1:41140 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:41141 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:44061 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:44062 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:49146 <-> ENABLED <-> OS-WINDOWS Microsoft Windows SMB named pipe buffer overflow attempt (os-windows.rules)

2019-02-19 15:22:04 UTC

Snort Subscriber Rules Update

Date: 2019-02-19

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2091101.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:49214 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49231 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49230 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49232 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49212 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49216 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49213 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49215 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49234 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49233 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49211 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49219 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49220 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49221 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49222 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49217 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49225 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49226 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49227 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49228 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49229 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49236 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49235 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49218 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49223 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49224 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)

Modified Rules:


 * 1:44062 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:44061 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:31033 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Cryptodefence variant outbound connection (malware-cnc.rules)
 * 1:49146 <-> ENABLED <-> OS-WINDOWS Microsoft Windows SMB named pipe buffer overflow attempt (os-windows.rules)
 * 1:41140 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:41141 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)

2019-02-19 15:22:04 UTC

Snort Subscriber Rules Update

Date: 2019-02-19

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 3000.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:49231 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (snort3-file-flash.rules)
 * 1:49227 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (snort3-file-pdf.rules)
 * 1:49215 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (snort3-malware-cnc.rules)
 * 1:49214 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (snort3-file-pdf.rules)
 * 1:49217 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (snort3-malware-cnc.rules)
 * 1:49211 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (snort3-file-pdf.rules)
 * 1:49236 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (snort3-file-pdf.rules)
 * 1:49235 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (snort3-file-pdf.rules)
 * 1:49234 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (snort3-file-pdf.rules)
 * 1:49228 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (snort3-file-pdf.rules)
 * 1:49212 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (snort3-file-pdf.rules)
 * 1:49220 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49221 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49222 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49223 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49230 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (snort3-file-pdf.rules)
 * 1:49218 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (snort3-malware-cnc.rules)
 * 1:49233 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (snort3-file-pdf.rules)
 * 1:49232 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (snort3-file-flash.rules)
 * 1:49219 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49213 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (snort3-file-pdf.rules)
 * 1:49216 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (snort3-malware-cnc.rules)
 * 1:49224 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (snort3-malware-cnc.rules)
 * 1:49225 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (snort3-file-pdf.rules)
 * 1:49226 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (snort3-file-pdf.rules)
 * 1:49229 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (snort3-file-pdf.rules)

Modified Rules:


 * 1:44061 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (snort3-file-image.rules)
 * 1:44062 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (snort3-file-image.rules)
 * 1:49146 <-> ENABLED <-> OS-WINDOWS Microsoft Windows SMB named pipe buffer overflow attempt (snort3-os-windows.rules)
 * 1:41140 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (snort3-file-office.rules)
 * 1:31033 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Cryptodefence variant outbound connection (snort3-malware-cnc.rules)
 * 1:41141 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (snort3-file-office.rules)

2019-02-19 15:22:04 UTC

Snort Subscriber Rules Update

Date: 2019-02-19

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2990.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:49232 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49211 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49231 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49234 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49235 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49236 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49214 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49220 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49221 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49222 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49223 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49218 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49213 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49215 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49212 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49216 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49217 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49219 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49230 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49233 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49224 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49225 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49226 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49227 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49228 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49229 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)

Modified Rules:


 * 1:44062 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:31033 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Cryptodefence variant outbound connection (malware-cnc.rules)
 * 1:41140 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:44061 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:49146 <-> ENABLED <-> OS-WINDOWS Microsoft Windows SMB named pipe buffer overflow attempt (os-windows.rules)
 * 1:41141 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)

2019-02-19 15:22:04 UTC

Snort Subscriber Rules Update

Date: 2019-02-19

This is the complete list of rules modified and added in the Sourcefire VRT Certified rule pack for Snort version 2983.

The format of the file is:

gid:sid <-> Default rule state <-> Message (rule group)

New Rules:


 * 1:49232 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49233 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49234 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript untrusted pointer dereference attempt detected (file-pdf.rules)
 * 1:49216 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49231 <-> DISABLED <-> FILE-FLASH Adobe Flash Player drawTriangles out-of-bounds read attempt (file-flash.rules)
 * 1:49214 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49220 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49221 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49235 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)
 * 1:49222 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49223 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49230 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49217 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49219 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49215 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49212 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49218 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Keymarble malicious executable download attempt (malware-cnc.rules)
 * 1:49224 <-> ENABLED <-> MALWARE-CNC Win.Dropper.Brusha malicious payload download attempt (malware-cnc.rules)
 * 1:49213 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine out-of-bounds read attempt (file-pdf.rules)
 * 1:49225 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49211 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49226 <-> ENABLED <-> FILE-PDF Adobe Acrobat Reader TIF orientation out of bounds read attempt (file-pdf.rules)
 * 1:49227 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49228 <-> ENABLED <-> FILE-PDF Adobe Acrobat JavaScript engine use after free attempt (file-pdf.rules)
 * 1:49229 <-> ENABLED <-> FILE-PDF Adobe Reader Javascript out-of-bounds write attempt (file-pdf.rules)
 * 1:49236 <-> ENABLED <-> FILE-PDF JavaScript XFA engine use after free attempt (file-pdf.rules)

Modified Rules:


 * 1:31033 <-> ENABLED <-> MALWARE-CNC Win.Trojan.Cryptodefence variant outbound connection (malware-cnc.rules)
 * 1:41140 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:44062 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)
 * 1:41141 <-> ENABLED <-> FILE-OFFICE Microsoft Office Word Out-of-Bounds Write attempt (file-office.rules)
 * 1:49146 <-> ENABLED <-> OS-WINDOWS Microsoft Windows SMB named pipe buffer overflow attempt (os-windows.rules)
 * 1:44061 <-> DISABLED <-> FILE-IMAGE Adobe Acrobat Pro malformed TIFF memory corruption attempt (file-image.rules)