First published: Mon Feb 19 2007(Updated: )
Description of problem: Sourcefire has learned of a remotely exploitable vulnerability in the Snort DCE/RPC preprocessor. This preprocessor is vulnerable to a stack-based buffer overflow that could potentially allow attackers to execute code with the same privileges as the Snort binary. Sourcefire has prepared updates for Snort open-source software to address this issue. Version-Release number of selected component (if applicable): Snort Versions Affected: * Snort 2.6.1, 2.6.1.1, and 2.6.1.2 * Snort 2.7.0 beta 1 How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/2.7.0.1 | <3. | 3. |
Snort Snort | =2.6.1 | |
Sourcefire Intrusion Sensor | =4.6 | |
Sourcefire Intrusion Sensor | =4.5 | |
Sourcefire Intrusion Sensor | =4.1 | |
Sourcefire Intrusion Sensor | =4.1 | |
Snort Snort | <=2.6.1.2 | |
Snort Snort | =2.6.1.1 | |
Sourcefire Intrusion Sensor | =4.6 | |
Snort Snort | =2.7_beta1 | |
Sourcefire Intrusion Sensor | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.