Page 4 of 20 results (0.006 seconds)

CVSS: 5.0EPSS: 13%CPEs: 1EXPL: 0

Algorithmic complexity vulnerability in Snort before 2.6.1, during predicate evaluation in rule matching for certain rules, allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack." Vulnerabilidad de complejidad algorítmica en Snort anterior a 2.6.1, durante la evaluación de un predicado en el chequeo de reglas para ciertas reglas, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU y parada de detección) mediante tráfico de red manipulado, también conocido como un "ataque de vuelta hacia atrás" (backtracking attack). • http://lists.immunitysec.com/pipermail/dailydave/2007-January/003954.html http://secunia.com/advisories/23716 http://secunia.com/advisories/24164 http://secunia.com/advisories/24338 http://security.gentoo.org/glsa/glsa-200702-03.xml http://securitytracker.com/id?1017508 http://www.acsac.org/2006/abstracts/54.html http://www.acsac.org/2006/advance_program.html http://www.acsac.org/2006/papers/54.pdf http://www.cs.wisc.edu/~smithr/pubs/acsac2006.pdf http://www.cs •

CVSS: 10.0EPSS: 39%CPEs: 9EXPL: 0

Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets. Desbordamiento de búfer en el preprocesador RPC de Snort 1.8 y 1.9.x anteriores a la 1.9.1 permite a atacantes remotos la ejecución arbitraria de código mediante paquetes RPC fragmentados. • http://marc.info/?l=bugtraq&m=104673386226064&w=2 http://marc.info/?l=bugtraq&m=104716001503409&w=2 http://marc.info/?l=bugtraq&m=105154530427824&w=2 http://www.cert.org/advisories/CA-2003-13.html http://www.debian.org/security/2003/dsa-297 http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 http://www.iss.net/security_center/static/10956.php http://www.kb.cert.org/vuls/id/916785 http://www.linuxsecurity.com/advisories/engarde_advisory-2944 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Unknown vulnerability in IP defragmenter (frag2) in Snort before 1.8.3 allows attackers to cause a denial of service (crash). • http://archives.neohapsis.com/archives/snort/2001-11/0990.html •

CVSS: 7.5EPSS: 7%CPEs: 8EXPL: 1

Various Intrusion Detection Systems (IDS) including (1) Cisco Secure Intrusion Detection System, (2) Cisco Catalyst 6000 Intrusion Detection System Module, (3) Dragon Sensor 4.x, (4) Snort before 1.8.1, (5) ISS RealSecure Network Sensor 5.x and 6.x before XPU 3.2, and (6) ISS RealSecure Server Sensor 5.5 and 6.0 for Windows, allow remote attackers to evade detection of HTTP attacks via non-standard "%u" Unicode encoding of ASCII characters in the requested URL. • https://www.exploit-db.com/exploits/21100 http://marc.info/?l=bugtraq&m=99972950200602&w=2 http://www.cisco.com/warp/public/707/cisco-intrusion-detection-obfuscation-vuln-pub.shtml http://www.kb.cert.org/vuls/id/548515 http://www.securityfocus.com/bid/3292 http://xforce.iss.net/alerts/advise95.php •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan. • http://archives.neohapsis.com/archives/bugtraq/2000-06/0122.html http://archives.neohapsis.com/archives/bugtraq/2000-06/0126.html •