[TriLUG] Snort vulnerability...

Mike Johnson mike at enoch.org
Thu Oct 20 15:34:34 EDT 2005


Jon Carnes wrote:
> How ironic is this?
> 
> === Cert Advisory TA05-291A ===
> The Snort Back Orifice preprocessor contains a buffer overflow that
> could allow a remote attacker to execute arbitrary code on a
> vulnerable system.

I almost feel that anyone still using the 'bo' plugin gets what they 
deserve...

As with any product, if there's a widget you're not using, turn it off!

Mike



More information about the TriLUG mailing list