Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Cisco Snort Vendors:   Sourcefire
Snort Input Validation Flaw Lets Remote Users Bypass Malware Detection on the Target System
SecurityTracker Alert ID:  1035439
SecurityTracker URL:
CVE Reference:   CVE-2016-1345   (Links to External Site)
Date:  Mar 31 2016
Impact:   Host/resource access via network, Modification of system information
Fix Available:  Yes  
Version(s): prior to
Description:   A vulnerability was reported in Snort. A remote user can bypass malware detection.

A remote user can supply specially crafted HTTP header values to the target system to trigger an input validation flaw in the malicious file detection and blocking features and bypass malware detection on the target system.

Systems compiled with the --enable-file-inspect configuration flag are affected.

[Editor's note: Cisco disclosed this vulnerability as affecting Cisco products (See Alert IDs 1035437 and 1035438; CVE-2016-1345).]

Dikla Barda, Liad Mizrachi, and Oded Vanunu of the Check Point Security Team reported this vulnerability.

Impact:   A remote user can bypass malware detection.
Solution:   The vendor has silently issued a fix (
Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC