First published: Thu May 22 2008(Updated: )
preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snort | <=2.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1804 is rated as a medium severity vulnerability due to its potential to bypass detection mechanisms.
To fix CVE-2008-1804, upgrade to Snort version 2.8.1 or later, which addresses the vulnerability.
CVE-2008-1804 facilitates remote attackers in bypassing detection rules through manipulation of packet fragment TTLs.
CVE-2008-1804 affects Snort versions prior to 2.8.1, specifically those up to and including 2.8.0.
The impact of CVE-2008-1804 on network security includes an increased risk of undetected malicious activity due to fragment evasion tactics.