SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Cisco Snort Vendors:   Cisco, Sourcefire
Cisco Snort++ Protocol Decoder Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1038483
SecurityTracker URL:  http://securitytracker.com/id/1038483
CVE Reference:   CVE-2017-6657, CVE-2017-6658   (Links to External Site)
Updated:  May 15 2017
Original Entry Date:  May 15 2017
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Snort 3 (Snort++)
Description:   Two vulnerabilities were reported in Cisco Snort++. A remote user can cause denial of service conditions on the target system.

The protocol decoder does not properly validate ether type numbers [CVE-2017-6657]. A remote user can send specially crafted data through the target device to cause the target Snort service to restart, dropping traffic or bypassing traffic inspection.

The protocol decoder contains a buffer overread error [CVE-2017-6658]. A remote user can send specially crafted data through the target device to cause the target Snort service to restart, dropping traffic or bypassing traffic inspection.

The original advisory is available at:

http://blog.snort.org/2017/05/snort-vulnerabilities-found.html

Bhargava Shastry reported these vulnerabilities.

Impact:   A remote user can cause traffic to be dropped or traffic inspection to be bypassed.
Solution:   The vendor has issued a source code fix (tagged BUILD_233), available at:

https://github.com/snortadmin/snort3

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC