[TriLUG] Snort vulnerability...

dsandif dsandif at email.unc.edu
Thu Oct 20 09:21:27 EDT 2005


Rick DeNatale wrote:

>On 20 Oct 2005 02:54:19 -0400, Jon Carnes <jonc at nc.rr.com> wrote:
>  
>
>>How ironic is this?
>>
>>=== Cert Advisory TA05-291A ===
>>The Snort Back Orifice preprocessor contains a buffer overflow that
>>could allow a remote attacker to execute arbitrary code on a
>>vulnerable system.
>>
>>Snort is a widely-deployed, open-source network intrusion detection
>>system (IDS). Snort and its components are used in other IDS
>>products, notably Sourcefire Intrusion Sensors, and Snort is
>>included with a number of operating system distributions.
>>    
>>
>
>Quis custodiet ipsos custodes?
>
>--
>Rick DeNatale
>
>Visit the Project Mercury Wiki Site
>http://www.mercuryspacecraft.com/
>  
>
Yea, we got that covered! 8-)



More information about the TriLUG mailing list