SHARE
Facebook X Pinterest WhatsApp

CERT Warns of Snort Vulnerabilities

Written By
thumbnail
Ryan Naraine
Ryan Naraine
Apr 17, 2003


Security researchers have found multiple security vulnerabilities in the
open-source Snort network intrusion
detection system, warning that older versions are wide open to code
execution and denial-of-service attacks.

Snort, which is used primarily to perform real-time traffic analysis and
packet logging on IP networks, has been upgraded to version 2.0 to fix the
holes. (Download location here).

An advisory from the CERT Coordination Center warned of two bugs, each in
a separate preprocessor module, that could let remote attackers execute
arbitrary code with the privileges of the user running Snort, typically
root.

The problems like in the preprocessor modules within Snort that lets
users personalize the system’s functionalities — the “stream4” TCP fragment
reassembly preprocessor and the RPC preprocessor.

In “stream4” preprocessor, researchers at CORE Security Technologies found a
heap overflow bug that can be exploited by an attacker. “To exploit this
vulnerability, an attacker must disrupt the state tracking mechanism of the
preprocessor module by sending a series of packets with crafted sequence
numbers. This causes the module to bypass a check for buffer overflow
attempts and allows the attacker to insert arbitrary code into the heap,”
CERT/CC warned.

Separately, researchers at the Internet Security Systems (ISS) discovered
a buffer overflow vulnerability in the Snort RPC preprocessor module. “When
the RPC decoder normalizes fragmented RPC records, it incorrectly checks the
lengths of what is being normalized against the current packet size, leading
to an overflow condition,” the Center said.

IT administrators running Snort have been warned that it was not
necessary for the intruder to know the IP address of the Snort device to
mount a successful attack. “Merely sending malicious traffic where it can be
observed by an affected Snort sensor is sufficient to exploit these
vulnerabilities.”

The lightweight Snort is used to perform protocol analysis, content
searching/matching and can be used to detect a variety of attacks and
probes, such as buffer overflows, port scans, CGI attacks or SMB probes.

Recommended for you...

Oracle’s NetBeans Headed to The Apache Software Foundation
Praise Be to the Dockercon 16 Demo Gods : Drink Espresso #dockercon
Facebook Gets Serious about Open-Source
Python 2 Gets New Security Features, Four Years After It was Supposed to Go Away
Internet News Logo

InternetNews is a source of industry news and intelligence for IT professionals from all branches of the technology world. InternetNews focuses on helping professionals grow their knowledge base and authority in their field with the top news and trends in Software, IT Management, Networking & Communications, and Small Business.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.