aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorsimon <simon@FreeBSD.org>2007-02-22 06:17:21 +0800
committersimon <simon@FreeBSD.org>2007-02-22 06:17:21 +0800
commitffcb941366316b8255aef21fcd3143ed69c9e6cc (patch)
treef6820156d2a27b38d90a5b40e582af1fdfacf62a /security
parent3d2887dbc4cd6134de5c9f7f9b9699b61be2035e (diff)
downloadfreebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.tar.gz
freebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.tar.zst
freebsd-ports-gnome-ffcb941366316b8255aef21fcd3143ed69c9e6cc.zip
Document snort -- DCE/RPC preprocessor vulnerability.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml45
1 files changed, 45 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 99eaae6c1eab..d785c72d9d86 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -34,6 +34,51 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="afdf500f-c1f6-11db-95c5-000c6ec775d9">
+ <topic>snort -- DCE/RPC preprocessor vulnerability</topic>
+ <affects>
+ <package>
+ <name>snort</name>
+ <range><ge>2.6.1</ge><lt>2.6.1.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>A IBM Internet Security Systems Protection Advisory
+ reports:</p>
+ <blockquote cite="http://iss.net/threats/257.html">
+ <p>Snort is vulnerable to a stack-based buffer overflow as a
+ result of DCE/RPC reassembly. This vulnerability is in a
+ dynamic-preprocessor enabled in the default configuration,
+ and the configuration for this preprocessor allows for
+ auto-recognition of SMB traffic to perform reassembly
+ on. No checks are performed to see if the traffic is part
+ of a valid TCP session, and multiple Write AndX requests
+ can be chained in the same TCP segment. As a result, an
+ attacker can exploit this overflow with a single TCP PDU
+ sent across a network monitored by Snort or Sourcefire.</p>
+ <p>Snort users who cannot upgrade immediately are advised to
+ disable the DCE/RPC preprocessor by removing the DCE/RPC
+ preprocessor directives from snort.conf and restarting
+ Snort. However, be advised that disabling the DCE/RPC
+ preprocessor reduces detection capabilities for attacks in
+ DCE/RPC traffic. After upgrading, customers should
+ re-enable the DCE/RPC preprocessor.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <certvu>196240</certvu>
+ <cvename>CVE-2006-5276</cvename>
+ <url>http://xforce.iss.net/xforce/xfdb/31275</url>
+ <url>http://www.snort.org/docs/advisory-2007-02-19.html</url>
+ </references>
+ <dates>
+ <discovery>2007-02-19</discovery>
+ <entry>2007-02-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="94234e00-be8a-11db-b2ec-000c6ec775d9">
<topic>rar -- password prompt buffer overflow vulnerability</topic>
<affects>