Jump to content

Security Advisory (MDKSA-2003:052): snort


aru
 Share

Recommended Posts

MandrakeSoft Security Advisory MDKSA-2003:052 : snort

 

April 28th, 2003

Updated snort packages fix remote vulnerability

 

An integer overflow was discovered in the Snort stream4 preprocessor by the Sourcefire Vulnerability Research Team. This preprocessor (spp_stream4) incorrectly calculates segment size parameters during stream reassembly for certainm sequence number ranges. This can lead to an integer overflow that can in turn lead to a heap overflow that can be exploited to perform a denial of service (DoS) or even remote command excution on the host running Snort.

 

Disabling the stream4 preprocessor will make Snort invulnerable to this attack, and the flaw has been fixed upstream in Snort version 2.0. Snort versions 1.8 through 1.9.1 are vulnerable.

 

 

The released versions of Mandrake GNU/Linux affected are:

  • 8.2

 

[*] 8.2/PPC

 

[*] 9.0

 

[*] 9.1

 

[*] 9.1/PPC

 

[*] Multi Network Firewall 8.2

 

[*] Corporate Server 2.1

Full information about this advisory, including the updated packages, is available at:

www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:052

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0209

http://www.snort.org/advisories/snort-2003-04-16-1.txt

 

Posted automatically by aru (mdksec2mub v0.0.5)

Link to comment
Share on other sites

 Share

×
×
  • Create New...