CVE-2003-0209 – Snort 1.9.1 - 'p7snort191.sh' Remote Command Execution
https://notcve.org/view.php?id=CVE-2003-0209
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow. Desbordamiento de enteros en el modulo de reensamblaje TCP (stream4) de Snort 2.0 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante números de secuencia largo en paquetes, lo que permite un desbordamiento de búfer basado en el montón. • https://www.exploit-db.com/exploits/18 http://marc.info/?l=bugtraq&m=105043563016235&w=2 http://marc.info/?l=bugtraq&m=105103586927007&w=2 http://marc.info/?l=bugtraq&m=105111217731583&w=2 http://marc.info/?l=bugtraq&m=105154530427824&w=2 http://marc.info/? •
CVE-2003-0033
https://notcve.org/view.php?id=CVE-2003-0033
Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets. Desbordamiento de búfer en el preprocesador RPC de Snort 1.8 y 1.9.x anteriores a la 1.9.1 permite a atacantes remotos la ejecución arbitraria de código mediante paquetes RPC fragmentados. • http://marc.info/?l=bugtraq&m=104673386226064&w=2 http://marc.info/?l=bugtraq&m=104716001503409&w=2 http://marc.info/?l=bugtraq&m=105154530427824&w=2 http://www.cert.org/advisories/CA-2003-13.html http://www.debian.org/security/2003/dsa-297 http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 http://www.iss.net/security_center/static/10956.php http://www.kb.cert.org/vuls/id/916785 http://www.linuxsecurity.com/advisories/engarde_advisory-2944 •
CVE-2001-1558
https://notcve.org/view.php?id=CVE-2001-1558
Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash). • http://archives.neohapsis.com/archives/snort/2001-11/0990.html •