Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4jj5-f426-fhfh

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.

EPSS

Процентиль: 72%
0.00725
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.

redhat
больше 17 лет назад

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.

nvd
больше 17 лет назад

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.

debian
больше 17 лет назад

preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not pr ...

EPSS

Процентиль: 72%
0.00725
Низкий