[TriLUG] Snort vulnerability...
dsandif at email.unc.edu
Thu Oct 20 09:21:27 EDT 2005
Rick DeNatale wrote:
>On 20 Oct 2005 02:54:19 -0400, Jon Carnes <jonc at nc.rr.com> wrote:
>>How ironic is this?
>>=== Cert Advisory TA05-291A ===
>>The Snort Back Orifice preprocessor contains a buffer overflow that
>>could allow a remote attacker to execute arbitrary code on a
>>Snort is a widely-deployed, open-source network intrusion detection
>>system (IDS). Snort and its components are used in other IDS
>>products, notably Sourcefire Intrusion Sensors, and Snort is
>>included with a number of operating system distributions.
>Quis custodiet ipsos custodes?
>Visit the Project Mercury Wiki Site
Yea, we got that covered! 8-)
More information about the TriLUG