|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: snort: denial of service in SACK TCP Option Error Handling | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE Linux 10.1 | Reporter: | Thomas Biege <thomas> |
| Component: | Security | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | patch-request, security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 129047 | ||
|
Description
Thomas Biege
2005-09-15 09:14:07 UTC
kssingvo vacation:
Mon 2005-09-19 - Fri 2005-10-07
remote dos
8 remote root user
-1 extra package
-1 default inactive
-1 DoS
Total Score: 5 (Moderate)
i think we could leave it until Klaus is back.
Thanks. Will work on it, as soon as scheduling and time permits. Digged deeper into it. http://www.snort.org/pub-bin/snortnews.cgi#58 says: This vulnerability is only present when Snort is run in verbose mode (using the switch -v). If you're running in verbose mode (which you should not be doing if you're running a NIDS) then you could be vulnerable. If you're running any of the standard NIDS logging modes like database, pcap or unified, you're fine. Suggested work-around for people, who do not want to upgrade: Users who do not wish to upgrade can simply not run Snort in verbose mode to avoid being vulnerable. I had a look at other distris: Red Hat nor Debian released a patch yet, and this since a month. Fixed packages submitted for all supported distris: SLES8, 9.0, SLES9, 9.2, 9.3, 10.0 (and all subversions). security-team: please handle rest of process. TIA. should be fixed together with bug #129047? close as fixed, further tracked in #129047. |