First published: Mon Jan 23 2017(Updated: )
Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Snort | =2.9.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1417 has a high severity rating due to the potential for remote code execution and DLL hijacking.
To fix CVE-2016-1417, ensure that Snort is updated to a version that mitigates this vulnerability.
CVE-2016-1417 affects Snort version 2.9.7.0 on Windows systems.
CVE-2016-1417 is associated with DLL hijacking attacks that could allow execution of arbitrary code.
Yes, CVE-2016-1417 can be exploited remotely without requiring user interaction.