Page 3 of 13 results (0.006 seconds)

CVSS: 10.0EPSS: 14%CPEs: 11EXPL: 2

Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow. Desbordamiento de enteros en el modulo de reensamblaje TCP (stream4) de Snort 2.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante números de secuencia largo en paquetes, lo que permite un desbordamiento de búfer basado en el montón. • https://www.exploit-db.com/exploits/18 http://marc.info/?l=bugtraq&m=105043563016235&w=2 http://marc.info/?l=bugtraq&m=105103586927007&w=2 http://marc.info/?l=bugtraq&m=105111217731583&w=2 http://marc.info/?l=bugtraq&m=105154530427824&w=2 http://marc.info/? •

CVSS: 10.0EPSS: 39%CPEs: 9EXPL: 0

Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets. Desbordamiento de búfer en el preprocesador RPC de Snort 1.8 y 1.9.x anteriores a la 1.9.1 permite a atacantes remotos la ejecución arbitraria de código mediante paquetes RPC fragmentados. • http://marc.info/?l=bugtraq&m=104673386226064&w=2 http://marc.info/?l=bugtraq&m=104716001503409&w=2 http://marc.info/?l=bugtraq&m=105154530427824&w=2 http://www.cert.org/advisories/CA-2003-13.html http://www.debian.org/security/2003/dsa-297 http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 http://www.iss.net/security_center/static/10956.php http://www.kb.cert.org/vuls/id/916785 http://www.linuxsecurity.com/advisories/engarde_advisory-2944 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash). • http://archives.neohapsis.com/archives/snort/2001-11/0990.html •