lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060316190036.7F59C4CF2@lists.grok.org.uk>
Date: Thu Mar 16 20:48:36 2006
From: native.code at gmail.com (native.code@...il.com)
Subject: ADVISORY - [Thu Mar 16 14:00:23 EST 2006] - DoS
	Vulnerability in Snort




ADVISORY - [Thu Mar 16 14:00:23 EST 2006] - DoS Vulnerability in Snort




1. BACKGROUND
There was no identified background.
2. DESCRIPTION
Sending a specially crafted  malformed  packet to the services communication socket can create a loss of service.

3. HISTORY
16-3-2006 - Public Disclosure.
4. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2006-531332 to this issue

APPENDIX A VENDOR INFORMATION
http://www.snort.org/

APPENDIX B REFERENCES
RFC 7463

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ