Bugzilla – Bug 129047
VUL-0: CVE-2005-3252: snort remote buffer overflow in backorifice dissector
Last modified: 2021-11-22 10:23:00 UTC
Hi Klaus, new snort problem... To: SuSE Security Team <security@suse.de> From: CERT Coordination Center <cert@cert.org> Cc: CERT Coordination Center <cert@cert.org> Subject: [security@suse.de] Vulnerability Notification [VU#175500] - suse Errors-To: security-bounces+meissner=suse.de@suse.de [-- PGP Ausgabe folgt (aktuelle Zeit: Di 18 Okt 2005 17:04:31 CEST) --] gpg: Unterschrift vom Di 18 Okt 2005 17:01:09 CEST, RSA Schlüssel ID 8E95B2F1 gpg: Korrekte Unterschrift von "CERT Coordination Center <cert@cert.org>" gpg: Bitte ein --check-trustdb durchführen gpg: WARNUNG: Dieser Schlüssel trägt keine vertrauenswürdige Signatur! gpg: Es gibt keinen Hinweis, daß die Signatur wirklich dem vorgeblichen Besitzer gehört. Haupt-Fingerabdruck = 64 61 C3 DA 0B 94 91 BF BE 11 D6 AE 10 7B 3E C7 gpg: WARNUNG: Botschaft wurde nicht integritätsgeschützt (integrity protected) [-- Ende der PGP-Ausgabe --] [-- BEGIN PGP MESSAGE --] Hello Folks, We've become aware of a buffer overflow in the Snort Back Orifice preprocessor that may allow a remote attacker to execute arbitrary code. This issue is publicly described at: http://www.snort.org/pub-bin/snortnews.cgi#99 In addition, we've published a US-CERT Vulnerability Note to address this issue, which is available at: http://www.kb.cert.org/vuls/id/175500 We are tracking this issue as VU#175500. Please include that number in the subject line of future email regarding this issue. Please begin to evaluate your products to determine if they are affected. If you provide us with a formal vendor statement regarding this issue, we will include it in our note. Thanks, -Jeff [Jeffrey S. Gennari | CERT/CC | 1.412.268.7090 | http://www.cert.org]
VU#175500
Thanks. What's the CAN/CVE number?
CVE-2005-3252
Fixed packages submitted for all supported distris: SLES8, 9.0, SLES9, 9.2, 9.3, 10.0 (and all subversions). security-team: please handle rest of process (remember: fix for bugzilla#117184 is included either). TIA.
AFAIK a remote exploit exists in the wild.
Maintenance-Tracker-2717
/work/src/done/PATCHINFO/snort.patch.maintained /work/src/done/PATCHINFO/snort.patch.box
updates released
CVE-2005-3252: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)