Snort bypass vulnerability

Published: 2006-06-01
Last Updated: 2006-06-01 16:28:10 UTC
by Jason Lam (Version: 2)
0 comment(s)
Update: (2006-06-01 16:10 UTC) Sourcefiree/ has issued their statement on the issue (patches coming Monday, 5 June):

Demarc just released a vulnerability alert on Snort. The vulnerability leads to evasion of URI content rules. When a carriage return is added to the end of a URL (before HTTP protocol declaration), Snort detection can be evaded. According to the alert, this vulnerability will affect thousands of detection rules in the standard rule base. No need to panic at the moment though, as the folks at Sourcefire have fixed this in version 2.6.0 and we haven't seen this kind of traffic in the wild yet. Thanks to Blake Hartstein for reporting this to us.  Also, thanks to our friends at Sourcefire for info on the extent of the problem and about the upcoming patch.

Please refer to the vulnerability alert for more details,

0 comment(s)


Diary Archives