Page 4 of 26 results (0.027 seconds)

CVSS: 5.0EPSS: 13%CPEs: 1EXPL: 0

Algorithmic complexity vulnerability in Snort before 2.6.1, during predicate evaluation in rule matching for certain rules, allows remote attackers to cause a denial of service (CPU consumption and detection outage) via crafted network traffic, aka a "backtracking attack." Vulnerabilidad de complejidad algorítmica en Snort anterior a 2.6.1, durante la evaluación de un predicado en el chequeo de reglas para ciertas reglas, permite a atacantes remotos provocar una denegación de servicio (consumo de CPU y parada de detección) mediante tráfico de red manipulado, también conocido como un "ataque de vuelta hacia atrás" (backtracking attack). • http://lists.immunitysec.com/pipermail/dailydave/2007-January/003954.html http://secunia.com/advisories/23716 http://secunia.com/advisories/24164 http://secunia.com/advisories/24338 http://security.gentoo.org/glsa/glsa-200702-03.xml http://securitytracker.com/id?1017508 http://www.acsac.org/2006/abstracts/54.html http://www.acsac.org/2006/advance_program.html http://www.acsac.org/2006/papers/54.pdf http://www.cs.wisc.edu/~smithr/pubs/acsac2006.pdf http://www.cs •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 5

The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration. El preprocesador HTTP Inspect (http_inspect) en Snort 2.4.0 hasta la versión 2.4.4 permite a atacantes remotos eludir reglas "uricontent" a través de un retorno de carro (\r) después de la URL y antes de la declaración HTTP. • https://www.exploit-db.com/exploits/27931 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html http://marc.info/?l=snort-devel&m=114909074311462&w=2 http://secunia.com/advisories/20413 http://secunia.com/advisories/20766 http://securityreason.com/securityalert/1018 http://securitytracker.com/id?1016191 http://www.demarc.com/support/downloads/patch_20060531 http://www.osvdb.org/25837 http://www.securityfocus.com/archive/1/435600/100/0/threaded http:/&#x • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The frag3 preprocessor in Sourcefire Snort 2.4.3 does not properly reassemble certain fragmented packets with IP options, which allows remote attackers to evade detection of certain attacks, possibly related to IP option lengths. • http://secunia.com/advisories/18959 http://www.securityfocus.com/archive/1/425290/100/0/threaded http://www.securityfocus.com/bid/16705 https://exchange.xforce.ibmcloud.com/vulnerabilities/24811 •

CVSS: 7.5EPSS: 95%CPEs: 3EXPL: 5

Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet. • https://www.exploit-db.com/exploits/1314 https://www.exploit-db.com/exploits/1272 https://www.exploit-db.com/exploits/16834 https://www.exploit-db.com/exploits/10026 https://www.exploit-db.com/exploits/1313 http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0505.html http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0010.html http://secunia.com/advisories/17220 http://secunia.com/advisories/17255 http://secunia.com/advisories/17559 http://securitytracker& •

CVSS: 7.8EPSS: 6%CPEs: 4EXPL: 7

The DecodeTCPOptions function in decode.c in Snort before 2.3.0, when printing TCP/IP options using FAST output or verbose mode, allows remote attackers to cause a denial of service (crash) via packets with invalid TCP/IP options, which trigger a null dereference. • https://www.exploit-db.com/exploits/25046 https://www.exploit-db.com/exploits/25047 http://secunia.com/advisories/13664 http://securitytracker.com/id?1012656 http://taosecurity.blogspot.com/2004/12/details-on-snort-dos-condition-you-may.html http://www.frsirt.com/exploits/20041222.angelDust.c.php http://www.osvdb.org/12578 http://www.securiteam.com/exploits/6X00L20C0S.html http://www.securityfocus.com/bid/12084 http://www.snort.org/arc_news https://exchange.xforce.ibmclou •