First published: Sun Dec 31 2000(Updated: )
Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snort | =1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-1226 is classified as a denial of service vulnerability that can crash Snort 1.6.
To mitigate CVE-2000-1226, upgrade to a later version of Snort that addresses this vulnerability.
CVE-2000-1226 affects Snort versions prior to 1.6 when running in specific logging modes.
CVE-2000-1226 can be exploited through the sending of non-IP protocols to cause a denial of service.
You can detect if your system is affected by CVE-2000-1226 by checking for the presence of Snort version 1.6 and its logging configurations.