Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Mar 2003 11:16:44 -0500 (EST)
From:      "Michael L. Squires" <mikes@siralan.org>
To:        freebsd-security@freebsd.org
Subject:   Snort 1.9.0 exploit
Message-ID:  <200303101616.h2AGGjcS010643@siralan.org>

next in thread | raw e-mail | index | archive | help
I got a message from SANS that the version of Snort that was part of
4.8-RC2, at least (1.8 through 1.9.0 and 2.0 beta) has a buffer
overflow problem that could be used to gain root access.

The quick fix is to disable the RPC preprocessor by commenting out the
line "preprocessor rpc_decode" in snort.conf.

See www.snort.org for more info.

Mike Squires

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200303101616.h2AGGjcS010643>