Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: snort (200303-6.1)
Date: Sat, 08 Mar 2003 17:40:00
Message-Id: 20030307113551.C0E955761@mail2.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200303-6.1
6 - - - ---------------------------------------------------------------------
7
8           PACKAGE : snort
9           SUMMARY : buffer overflow
10              DATE : 2003-03-06 10:59 UTC
11           EXPLOIT : remote
12 VERSIONS AFFECTED : <1.9.1
13     FIXED VERSION : =>1.9.1
14               CVE : CAN-2003-0033
15
16 - - - ---------------------------------------------------------------------
17
18 - - From advisory:
19
20 "Remote attackers may exploit the buffer overflow condition to run
21 arbitrary code on a Snort sensor with the privileges of the Snort IDS
22 process, which typically runs as the superuser. The vulnerable
23 preprocessor is enabled by default. It is not necessary to establish
24 an actual connection to a RPC portmapper service to exploit this
25 vulnerability."
26
27 Read the full advisory at:
28 http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951
29
30 SOLUTION
31
32 It is recommended that all Gentoo Linux users who are running
33 net-analyzer/snort upgrade to snort-1.9.1 as follows:
34
35 emerge sync
36 emerge -u snort
37 emerge clean
38
39 - - - ---------------------------------------------------------------------
40 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
41 - - - ---------------------------------------------------------------------
42 -----BEGIN PGP SIGNATURE-----
43 Version: GnuPG v1.2.1 (GNU/Linux)
44
45 iD8DBQE+aIVJfT7nyhUpoZMRAlEBAJ9bQ2DtVTLgZDqUXfbAIB3Ruwd/dQCgh81e
46 V2BQR1tEGzaUGMhWAbtiSng=
47 =RkkJ
48 -----END PGP SIGNATURE-----