[TriLUG] Snort vulnerability...

Rick DeNatale rick.denatale at gmail.com
Thu Oct 20 09:01:04 EDT 2005


On 20 Oct 2005 02:54:19 -0400, Jon Carnes <jonc at nc.rr.com> wrote:
> How ironic is this?
>
> === Cert Advisory TA05-291A ===
> The Snort Back Orifice preprocessor contains a buffer overflow that
> could allow a remote attacker to execute arbitrary code on a
> vulnerable system.
>
> Snort is a widely-deployed, open-source network intrusion detection
> system (IDS). Snort and its components are used in other IDS
> products, notably Sourcefire Intrusion Sensors, and Snort is
> included with a number of operating system distributions.

Quis custodiet ipsos custodes?

--
Rick DeNatale

Visit the Project Mercury Wiki Site
http://www.mercuryspacecraft.com/



More information about the TriLUG mailing list