lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060317020050.95CA7A5A5@lists.grok.org.uk> Date: Fri Mar 17 02:21:40 2006 From: merlyn at stonehenge.com (Randal L. Schwartz) Subject: -Advisory- $ =Thu Mar 16 21:00:45 EST 2006= $ DoS Vulnerability in Snort -Advisory- $ =Thu Mar 16 21:00:45 EST 2006= $ DoS Vulnerability in Snort [+] History 25-1-2006 [+] Vendor Notification. 11-2-2006 [+] Vendor Reply. 16-3-2006 [+] Public Disclosure. [+] Workaround This issue has no identified workarounds on this problem in question. Appendix A Vendor Information http://www.snort.org/ Appendix B References RFC 5793 Contact Randal L. Schwartz merlyn@...nehenge.com CISSP GSAE CCE CSFA GREM GHTQ CAP