From owner-freebsd-security Mon Mar 10 8:16:50 2003 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 10B7A37B401 for ; Mon, 10 Mar 2003 08:16:48 -0800 (PST) Received: from siralan.org (12-222-67-235.client.insightBB.com [12.222.67.235]) by mx1.FreeBSD.org (Postfix) with ESMTP id F18D943FBD for ; Mon, 10 Mar 2003 08:16:46 -0800 (PST) (envelope-from mikes@siralan.org) Received: from siralan.org (localhost [127.0.0.1]) by siralan.org (8.12.8/8.12.7) with ESMTP id h2AGGj9P010644 for ; Mon, 10 Mar 2003 11:16:45 -0500 (EST) (envelope-from mikes@siralan.org) Received: (from mikes@localhost) by siralan.org (8.12.8/8.12.8/Submit) id h2AGGjcS010643 for freebsd-security@freebsd.org; Mon, 10 Mar 2003 11:16:45 -0500 (EST) From: "Michael L. Squires" Message-Id: <200303101616.h2AGGjcS010643@siralan.org> Subject: Snort 1.9.0 exploit To: freebsd-security@freebsd.org Date: Mon, 10 Mar 2003 11:16:44 -0500 (EST) X-Mailer: ELM [version 2.4ME+ PL88 (25)] MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org I got a message from SANS that the version of Snort that was part of 4.8-RC2, at least (1.8 through 1.9.0 and 2.0 beta) has a buffer overflow problem that could be used to gain root access. The quick fix is to disable the RPC preprocessor by commenting out the line "preprocessor rpc_decode" in snort.conf. See www.snort.org for more info. Mike Squires To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message