diff options
author | simon <simon@FreeBSD.org> | 2007-02-22 06:17:21 +0800 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2007-02-22 06:17:21 +0800 |
commit | ffcb941366316b8255aef21fcd3143ed69c9e6cc (patch) | |
tree | f6820156d2a27b38d90a5b40e582af1fdfacf62a /security | |
parent | 3d2887dbc4cd6134de5c9f7f9b9699b61be2035e (diff) | |
download | freebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.tar.gz freebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.tar.zst freebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.zip |
Document snort -- DCE/RPC preprocessor vulnerability.
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 99eaae6c1eab..d785c72d9d86 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="afdf500f-c1f6-11db-95c5-000c6ec775d9"> + <topic>snort -- DCE/RPC preprocessor vulnerability</topic> + <affects> + <package> + <name>snort</name> + <range><ge>2.6.1</ge><lt>2.6.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>A IBM Internet Security Systems Protection Advisory + reports:</p> + <blockquote cite="http://iss.net/threats/257.html"> + <p>Snort is vulnerable to a stack-based buffer overflow as a + result of DCE/RPC reassembly. This vulnerability is in a + dynamic-preprocessor enabled in the default configuration, + and the configuration for this preprocessor allows for + auto-recognition of SMB traffic to perform reassembly + on. No checks are performed to see if the traffic is part + of a valid TCP session, and multiple Write AndX requests + can be chained in the same TCP segment. As a result, an + attacker can exploit this overflow with a single TCP PDU + sent across a network monitored by Snort or Sourcefire.</p> + <p>Snort users who cannot upgrade immediately are advised to + disable the DCE/RPC preprocessor by removing the DCE/RPC + preprocessor directives from snort.conf and restarting + Snort. However, be advised that disabling the DCE/RPC + preprocessor reduces detection capabilities for attacks in + DCE/RPC traffic. After upgrading, customers should + re-enable the DCE/RPC preprocessor.</p> + </blockquote> + </body> + </description> + <references> + <certvu>196240</certvu> + <cvename>CVE-2006-5276</cvename> + <url>http://xforce.iss.net/xforce/xfdb/31275</url> + <url>http://www.snort.org/docs/advisory-2007-02-19.html</url> + </references> + <dates> + <discovery>2007-02-19</discovery> + <entry>2007-02-21</entry> + </dates> + </vuln> + <vuln vid="94234e00-be8a-11db-b2ec-000c6ec775d9"> <topic>rar -- password prompt buffer overflow vulnerability</topic> <affects> |