The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Snort

Snort: denial of service via SMB
An attacker can send malicious SMB packets to Snort, in order to trigger a denial of service...
cisco-sa-20190501-frpwr-smb-snort, CVE-2019-1696, CVE-2019-1704, VIGILANCE-VUL-29400
Snort: executing DLL code via tcapi.dll
An attacker can create a malicious tcapi.dll DLL, and then put it in the current directory of Snort, in order to execute code...
CVE-2016-1417, VIGILANCE-VUL-20752
Snort: buffer overflow of Sourcefire VRT Rules
When the administrator installed Sourcefire VRT Rules, and enabled the rule "3:20275", an attacker can use the DCE RPC EnumeratePrintShares function, in order to trigger an overflow in Snort, which may lead to code execution...
BID-57476, CERTA-2013-AVI-056, VIGILANCE-VUL-12343
IDS, IPS: Advanced Evasion Techniques
Twenty three cases of standard techniques of packets variations are not detected by most IDS/IPS...
CVE-2010-0102, SBP-2010-31, SBP-2010-32, SBP-2010-33, SBP-2010-34, SBP-2010-35, VIGILANCE-VUL-10227
Snort: denials of service of IPv6
When IPv6 is enabled, an attacker can send malformed packets in order to stop Snort...
BID-36795, CVE-2009-3641, FEDORA-2009-10751, FEDORA-2009-10783, VIGILANCE-VUL-9117
Snort: corruption of unified logs
When the unified logging is enabled, an attacker can send special packets in order to corrupt the log file of Snort...
BID-36473, VIGILANCE-VUL-9036
Snort: bypassing with fragments
An attacker can fragment his IP packets in order to bypass all Snort rules...
BID-29327, CERTA-2008-AVI-261, CVE-2008-1804, FEDORA-2008-4986, FEDORA-2008-5001, FEDORA-2008-5045, MDVSA-2009:259, MDVSA-2009:259-1, VIGILANCE-VUL-7846
PCRE: integer overflows of regular expressions
When attacker can change the regular expression used by a program, he can corrupt its memory in order for example to execute code...
BID-26462, BID-26725, BID-26727, CERTA-2007-AVI-513, CERTA-2008-AVI-103, CERTA-2008-AVI-207, CERTA-2008-AVI-239, CESA-2007-006, CVE-2005-4872, CVE-2006-7224-REJECT, CVE-2006-7225, CVE-2006-7226, CVE-2006-7227, CVE-2006-7228, DSA-1570-1, MDVSA-2008:012, RHSA-2007:1052-01, RHSA-2007:1052-02, RHSA-2007:1059-01, RHSA-2007:1063-01, RHSA-2007:1065-01, RHSA-2007:1068-01, RHSA-2007:1076-02, RHSA-2007:1077-01, RHSA-2008:0546-01, SUSE-SA:2007:062, SUSE-SA:2008:004, VIGILANCE-VUL-7332, VMSA-2008-0003, VMSA-2008-0003.1, VMSA-2008-0007, VMSA-2008-0007.1, VMSA-2008-0007.2
PCRE: overflow of regular expressions
When attacker can change the regular expression used by a program, he can corrupt its memory in order for example to execute code...
BID-26550, CERTA-2008-AVI-239, CVE-2006-7230, DSA-1570-1, RHSA-2007:1059-01, RHSA-2007:1068-01, SUSE-SA:2007:062, SUSE-SA:2008:004, VIGILANCE-VUL-7354
Perl, PCRE: vulnerabilities of regular expressions
When attacker can change the regular expression used by a program, he can corrupt its memory in order for example to execute code...
231524, 315871, 315881, 323571, 6629836, BID-26346, BID-26350, c01362465, CERTA-2007-AVI-481, CERTA-2008-AVI-053, CERTA-2008-AVI-239, CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768, CVE-2007-5116, DSA-1399-1, DSA-1400-1, DSA-1570-1, FEDORA-2007-2944, FEDORA-2007-3255, FEDORA-2007-748, HPSBTU02311, IZ10220, IZ10244, IZ10245, MDKSA-2007:207, MDKSA-2007:211, MDKSA-2007:212, MDKSA-2007:213, RHSA-2007:0966-01, RHSA-2007:0967-01, RHSA-2007:0968-01, RHSA-2007:1011-01, RHSA-2007:1063-01, RHSA-2007:1065-01, RHSA-2007:1068-01, RHSA-2007:1126-01, RHSA-2008:0546-01, RHSA-2010:0602-02, SSRT080001, SUSE-SA:2007:062, SUSE-SA:2008:004, SUSE-SR:2007:024, SUSE-SR:2007:025, VIGILANCE-VUL-7311, VMSA-2008-0001, VMSA-2008-0001.1, VMSA-2008-0007, VMSA-2008-0007.1, VMSA-2008-0007.2
Our database contains other pages. You can request a free trial to read them.

Display information about Snort: