Page 3 of 23 results (0.012 seconds)

CVSS: 10.0EPSS: 71%CPEs: 10EXPL: 4

Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 before beta 2; and Sourcefire Intrusion Sensor; allows remote attackers to execute arbitrary code via crafted SMB traffic. Desbordamiento de búfer en el preprocesador DCE/RPC en Snort anterior a 2.6.1.3, y 2.7 anterior a beta 2; y Sourcefire Intrusion Sensor;permite a atacantes remotos ejecutar código de su elección mediante tráfico SMB manipulado. • https://www.exploit-db.com/exploits/3609 https://www.exploit-db.com/exploits/3362 https://www.exploit-db.com/exploits/18723 https://www.exploit-db.com/exploits/3391 http://fedoranews.org/updates/FEDORA-2007-206.shtml http://iss.net/threats/257.html http://secunia.com/advisories/24190 http://secunia.com/advisories/24235 http://secunia.com/advisories/24239 http://secunia.com/advisories/24240 http://secunia.com/advisories/24272 http://secunia.com/advisories/26746 htt •

CVSS: 7.8EPSS: 5%CPEs: 1EXPL: 0

Integer underflow in the DecodeGRE function in src/decode.c in Snort 2.6.1.2 allows remote attackers to trigger dereferencing of certain memory locations via crafted GRE packets, which may cause corruption of log files or writing of sensitive information into log files. Desbordamiento inferior de entero en la función DecodeGRE en src/decode.c en Snort 2.6.1.2 permite a atacantes remotos provocar referencias a ciertas localizaciones de memoria mediante paquetes GRE artesanales, lo cual puede causar la corrupción de ficheros de log o la escritura de información sensible en ficheros de log. • http://labs.calyptix.com/advisories/CX-2007-01.txt http://osvdb.org/32095 http://osvdb.org/33464 http://securityreason.com/securityalert/2165 http://securitytracker.com/id?1017507 http://www.securityfocus.com/archive/1/456598/100/0/threaded http://www.securityfocus.com/bid/22004 http://www.snort.org/got_source/source.html http://www.vupen.com/english/advisories/2007/0152 •

CVSS: 5.0EPSS: 13%CPEs: 1EXPL: 0

Algorithmic complexity vulnerability in Snort before 2.6.1, during predicate evaluation in rule matching for certain rules, allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack." Vulnerabilidad de complejidad algorítmica en Snort anterior a 2.6.1, durante la evaluación de un predicado en el chequeo de reglas para ciertas reglas, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU y parada de detección) mediante tráfico de red manipulado, también conocido como un "ataque de vuelta hacia atrás" (backtracking attack). • http://lists.immunitysec.com/pipermail/dailydave/2007-January/003954.html http://secunia.com/advisories/23716 http://secunia.com/advisories/24164 http://secunia.com/advisories/24338 http://security.gentoo.org/glsa/glsa-200702-03.xml http://securitytracker.com/id?1017508 http://www.acsac.org/2006/abstracts/54.html http://www.acsac.org/2006/advance_program.html http://www.acsac.org/2006/papers/54.pdf http://www.cs.wisc.edu/~smithr/pubs/acsac2006.pdf http://www.cs •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 5

The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration. El preprocesador HTTP Inspect (http_inspect) en Snort 2.4.0 hasta la versión 2.4.4 permite a atacantes remotos eludir reglas "uricontent" a través de un retorno de carro (\r) después de la URL y antes de la declaración HTTP. • https://www.exploit-db.com/exploits/27931 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html http://marc.info/?l=snort-devel&m=114909074311462&w=2 http://secunia.com/advisories/20413 http://secunia.com/advisories/20766 http://securityreason.com/securityalert/1018 http://securitytracker.com/id?1016191 http://www.demarc.com/support/downloads/patch_20060531 http://www.osvdb.org/25837 http://www.securityfocus.com/archive/1/435600/100/0/threaded http:/&#x • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The frag3 preprocessor in Sourcefire Snort 2.4.3 does not properly reassemble certain fragmented packets with IP options, which allows remote attackers to evade detection of certain attacks, possibly related to IP option lengths. • http://secunia.com/advisories/18959 http://www.securityfocus.com/archive/1/425290/100/0/threaded http://www.securityfocus.com/bid/16705 https://exchange.xforce.ibmcloud.com/vulnerabilities/24811 •