First published: Fri Dec 31 2004(Updated: )
The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sourcefire Snort | =2.2 | |
Sourcefire Snort | =2.1.1_rc1 | |
Sourcefire Snort | =2.1.0 | |
Sourcefire Snort | =2.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2652 has a medium severity rating as it can cause a denial of service through a crash.
To fix CVE-2004-2652, upgrade to Snort version 2.3.0 or later.
CVE-2004-2652 affects Snort versions 2.2 and prior, including specific release candidates.
The vulnerability in CVE-2004-2652 is caused by a null dereference when processing invalid TCP/IP options.
Yes, CVE-2004-2652 can be exploited by remote attackers sending specially crafted packets.