First published: Mon Feb 19 2007(Updated: )
Description of problem: Sourcefire has learned of a remotely exploitable vulnerability in the Snort DCE/RPC preprocessor. This preprocessor is vulnerable to a stack-based buffer overflow that could potentially allow attackers to execute code with the same privileges as the Snort binary. Sourcefire has prepared updates for Snort open-source software to address this issue. Version-Release number of selected component (if applicable): Snort Versions Affected: * Snort 2.6.1, 2.6.1.1, and 2.6.1.2 * Snort 2.7.0 beta 1 How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/2.7.0.1 | <3. | 3. |
Snort Snort | =2.6.1 | |
Sourcefire Intrusion Sensor | =4.6 | |
Sourcefire Intrusion Sensor | =4.5 | |
Sourcefire Intrusion Sensor | =4.1 | |
Sourcefire Intrusion Sensor | =4.1 | |
Snort Snort | <=2.6.1.2 | |
Snort Snort | =2.6.1.1 | |
Sourcefire Intrusion Sensor | =4.6 | |
Snort Snort | =2.7_beta1 | |
Sourcefire Intrusion Sensor | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5276 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2006-5276, users should upgrade to Snort version 2.7 or later.
CVE-2006-5276 affects specific versions of Snort, Sourcefire Intrusion Sensor, and certain other packages.
Yes, CVE-2006-5276 is a remotely exploitable stack-based buffer overflow vulnerability.
An attacker exploiting CVE-2006-5276 could execute arbitrary code with the same privileges as the Snort binary.