[TriLUG] Snort vulnerability...
Mike Johnson
mike at enoch.org
Thu Oct 20 15:34:34 EDT 2005
Jon Carnes wrote:
> How ironic is this?
>
> === Cert Advisory TA05-291A ===
> The Snort Back Orifice preprocessor contains a buffer overflow that
> could allow a remote attacker to execute arbitrary code on a
> vulnerable system.
I almost feel that anyone still using the 'bo' plugin gets what they
deserve...
As with any product, if there's a widget you're not using, turn it off!
Mike
More information about the TriLUG
mailing list