lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <FE851D61C46DD311BC1700508B085E961816B114@eumorx6.bp.com>
Date: Fri, 7 Mar 2003 09:27:40 -0000
From: "Martinez, Sylvain" <Sylvain_Martinez@....bp.com>
To: bugtraq@...urityfocus.com
Subject: Smoothwall Firewall SNORT buffer overflow


All,

Please note that the Linux based firewall smoothwall
(http://www.smoothwall.org) is using a vulnerable version of snort.
A patch has been released for the stable GPL 1.0 version: 
http://www.smoothwall.org/home/news/item/20030305.01.html
However, no patch has been released for the beta version GPL 2.0 Mallard. If
you are running this version you should disable snort from the admin
configuration panel.

I am sending an email to this list because I have contacted the snort
developers some days ago and no announcement/information has yet been
published on their website or on the 
developer mailing list.
Snort vulnerability reference: 
http://www.kb.cert.org/vuls/id/916785

- - -
Mr Sylvain Martinez
Infrastructure Security Specialist
http://www.encryptsolutions.com


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ