Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=105103586927007&w=2 | mailing list |
http://www.securityfocus.com/bid/7178 | exploit vdb entry patch vendor advisory |
http://www.cert.org/advisories/CA-2003-13.html | third party advisory us government resource |
http://marc.info/?l=bugtraq&m=105043563016235&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=105172790914107&w=2 | vendor advisory |
http://www.kb.cert.org/vuls/id/139129 | third party advisory us government resource |
http://www.debian.org/security/2003/dsa-297 | vendor advisory |
http://marc.info/?l=bugtraq&m=105111217731583&w=2 | mailing list |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:052 | vendor advisory |
http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10 | |
http://marc.info/?l=bugtraq&m=105154530427824&w=2 | mailing list |