Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets.
Link | Tags |
---|---|
http://www.cert.org/advisories/CA-2003-13.html | third party advisory us government resource |
http://www.debian.org/security/2003/dsa-297 | vendor advisory |
http://www.kb.cert.org/vuls/id/916785 | third party advisory us government resource |
http://www.linuxsecurity.com/advisories/engarde_advisory-2944.html | vendor advisory |
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:029 | vendor advisory |
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 | third party advisory patch vendor advisory |
http://www.iss.net/security_center/static/10956.php | vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=105154530427824&w=2 | vendor advisory |
http://marc.info/?l=bugtraq&m=104716001503409&w=2 | vendor advisory |
http://www.osvdb.org/4418 | vdb entry |
http://www.securityfocus.com/bid/6963 | vdb entry patch vendor advisory |
http://marc.info/?l=bugtraq&m=104673386226064&w=2 | mailing list |