blob: 40d0c6b0bc0b71da900c85dd94347472a04048dc [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200702-03">
<title>Snort: Denial of Service</title>
Snort contains a vulnerability in the rule matching algorithm that could
result in a Denial of Service.
<product type="ebuild">snort</product>
<announced>February 13, 2007</announced>
<revised>February 13, 2007: 01</revised>
<package name="net-analyzer/snort" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
Snort is a widely deployed intrusion detection program.
Randy Smith, Christian Estan and Somesh Jha discovered that the rule
matching algorithm of Snort can be exploited in a way known as a
"backtracking attack" to perform numerous time-consuming operations.
<impact type="normal">
A remote attacker could send specially crafted network packets, which
would result in the cessation of the detections and the consumption of
the CPU resources.
There is no known workaround at this time.
All Snort users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/snort-;</code>
<uri link="">CVE-2006-6931</uri>
<metadata tag="requester" timestamp="Sat, 10 Feb 2007 19:01:49 +0000">
<metadata tag="bugReady" timestamp="Mon, 12 Feb 2007 22:41:30 +0000">
<metadata tag="submitter" timestamp="Mon, 12 Feb 2007 23:29:42 +0000">