Snort DecodeTCPOptions远程拒绝服务漏洞

漏洞信息详情

Snort DecodeTCPOptions远程拒绝服务漏洞

漏洞简介

Snort 2.3.0之前的版本的decode.c的DecodeTCPOptions函数在打印使用FAST输出或详细模式的TCP/IP选项时存在漏洞。远程攻击者可以借助一些带有失效TCP/IP选项的数据包导致服务拒绝(崩溃),该漏洞可以引发一个空解引用。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: SECTRACK
名称: 1012656
链接:http://securitytracker.com/id?1012656

来源: SECUNIA
名称: 13664
链接:http://secunia.com/advisories/13664

来源: XF
名称: snort-tcpip-printing-dos(18689)
链接:http://xforce.iss.net/xforce/xfdb/18689

来源: www.snort.org
链接:http://www.snort.org/arc_news/

来源: BID
名称: 12084
链接:http://www.securityfocus.com/bid/12084

来源: www.securiteam.com
链接:http://www.securiteam.com/exploits/6X00L20C0S.html

来源: OSVDB
名称: 12578
链接:http://www.osvdb.org/12578

来源: www.frsirt.com
链接:http://www.frsirt.com/exploits/20041222.angelDust.c.php

来源: taosecurity.blogspot.com
链接:http://taosecurity.blogspot.com/2004/12/details-on-snort-dos-condition-you-may.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享