Experts warn of Snort vulnerability

By
Follow google news

Hackers intrude on intrusion detection system.

Experts warn of Snort vulnerability
A security vulnerability has been discovered in the Snort open source intrusion detection system.

Discovered by Neel Mehta from IBM's X-Force, the flaw exists in the Snort DCE/RPC pre-processor. 

A remote attacker could cause a buffer overflow and execute arbitrary code with root or system privileges by sending specially-crafted Server Message Block traffic to a vulnerable system.

Server Message Block is a protocol for sharing files, printers, serial ports and communications between computers.

This bug affects Snort 2.6.1, 2.6.1.1, 2.6.1.2 and Snort 2.7.0 beta 1. An update is available to correct the problem.

Snort advises users who cannot upgrade immediately to disable the DCE/RPC pre-processor by removing the directives from snort.conf and restarting Snort.

However, it should be noted that disabling this pre-processor reduces detection capabilities for attacks in DCE/RPC traffic. After upgrading, customers should re-enable the DCE/RPC pre-processor.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

FBI remotely patched privately-owned routers to evict Russian GRU spies

FBI remotely patched privately-owned routers to evict Russian GRU spies

CBA onboards customers with NFC scans of ePassports

CBA onboards customers with NFC scans of ePassports

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Anthropic touts AI cyber security project

Anthropic touts AI cyber security project

Log In

  |  Forgot your password?