Date: Mon, 10 Mar 2003 11:16:44 -0500 (EST) From: "Michael L. Squires" <mikes@siralan.org> To: freebsd-security@freebsd.org Subject: Snort 1.9.0 exploit Message-ID: <200303101616.h2AGGjcS010643@siralan.org>
next in thread | raw e-mail | index | archive | help
I got a message from SANS that the version of Snort that was part of 4.8-RC2, at least (1.8 through 1.9.0 and 2.0 beta) has a buffer overflow problem that could be used to gain root access. The quick fix is to disable the RPC preprocessor by commenting out the line "preprocessor rpc_decode" in snort.conf. See www.snort.org for more info. Mike Squires To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200303101616.h2AGGjcS010643>