Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets.
References
Link | Resource |
---|---|
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 | Patch Vendor Advisory |
http://www.iss.net/security_center/static/10956.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/6963 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/916785 | Third Party Advisory US Government Resource |
http://www.debian.org/security/2003/dsa-297 | |
http://www.linuxsecurity.com/advisories/engarde_advisory-2944.html | |
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:029 | |
http://www.cert.org/advisories/CA-2003-13.html | US Government Resource |
http://www.osvdb.org/4418 | |
http://marc.info/?l=bugtraq&m=105154530427824&w=2 | |
http://marc.info/?l=bugtraq&m=104673386226064&w=2 | |
http://marc.info/?l=bugtraq&m=104716001503409&w=2 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-03-06 21:00
Updated : 2016-10-17 19:28
NVD link : CVE-2003-0033
Mitre link : CVE-2003-0033
JSON object : View
CWE
Products Affected
snort
- snort