lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060316184013.BD5602B76@lists.grok.org.uk> Date: Thu Mar 16 19:32:34 2006 From: dr at kyx.net (dr@....net) Subject: -advisory- * [Thu Mar 16 13:40:07 EST 2006] * DoS Vulnerability in Snort -advisory- * [Thu Mar 16 13:40:07 EST 2006] * DoS Vulnerability in Snort ++++++++ I. BACKGROUND ++++++++ This problem had no identified background commentary on the problem at hand. ++++++++ II. DESCRIPTION ++++++++ Sending a specially crafted malformed packet to the services communication socket can create a loss of service. ++++++++ III. HISTORY ++++++++ 2-12-2006 - Vendor Notification. 3-16-2006 - Public Disclosure. ++++++++ IV. WORKAROUND ++++++++ This advisory has no workarounds. ++++++++ V. VENDOR RESPONSE ++++++++ Snort had presented no explanation. ++++++++ VI. CVE INFORMATION ++++++++ The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-870137 to this issue ++++++++ APPENDIX A VENDOR INFORMATION ++++++++ http://www.snort.org/ ++++++++ APPENDIX B REFERENCES ++++++++ RFC 7335 ++++++++ CONTACT ++++++++ Dragos Ruiu lolville@...m.la 1-888-565-9428 GSAE GREM SSP-CNSA GIPS SSCP