First published: Tue Jan 16 2007(Updated: )
Algorithmic complexity vulnerability in Snort before 2.6.1, during predicate evaluation in rule matching for certain rules, allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snort | <=2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6931 is considered a moderate severity vulnerability due to its potential to cause denial of service through CPU exhaustion.
To fix CVE-2006-6931, upgrade Snort to version 2.6.3 or later, which addresses the algorithmic complexity vulnerability.
CVE-2006-6931 facilitates a backtracking attack that can lead to increased CPU consumption and potential detection outage.
Snort versions prior to 2.6.3 are affected by CVE-2006-6931.
Exploiting CVE-2006-6931 can result in a denial of service, preventing Snort from effectively detecting network threats.