lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060316184013.BD5602B76@lists.grok.org.uk>
Date: Thu Mar 16 19:32:34 2006
From: dr at kyx.net (dr@....net)
Subject: -advisory- * [Thu Mar 16 13:40:07 EST 2006] * DoS
	Vulnerability in Snort




-advisory- * [Thu Mar 16 13:40:07 EST 2006] * DoS Vulnerability in Snort




++++++++
I. BACKGROUND
++++++++
This problem had no identified background commentary on the problem at hand.
++++++++
II. DESCRIPTION
++++++++
Sending a specially crafted  malformed  packet to the services communication socket can create a loss of service.

++++++++
III. HISTORY
++++++++
2-12-2006 - Vendor Notification.
3-16-2006 - Public Disclosure.
++++++++
IV. WORKAROUND
++++++++
This advisory has no workarounds.
++++++++
V. VENDOR RESPONSE
++++++++
Snort had presented no explanation.
++++++++
VI. CVE INFORMATION
++++++++
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-870137 to this issue

++++++++
APPENDIX A VENDOR INFORMATION
++++++++
http://www.snort.org/

++++++++
APPENDIX B REFERENCES
++++++++
RFC 7335

++++++++
CONTACT
++++++++
Dragos Ruiu lolville@...m.la
1-888-565-9428

GSAE GREM SSP-CNSA GIPS SSCP 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ