Описание
Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2009-3641
- https://bugzilla.redhat.com/show_bug.cgi?id=530863
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53912
- http://dl.snort.org/snort-current/release_notes_2851.txt
- http://marc.info/?l=oss-security&m=125649553414700&w=2
- http://seclists.org/fulldisclosure/2009/Oct/299
- http://secunia.com/advisories/37135
- http://securitytracker.com/id?1023076
- http://vrt-sourcefire.blogspot.com/2009/10/snort-2851-release.html
- http://www.openwall.com/lists/oss-security/2009/10/25/5
- http://www.osvdb.org/59159
- http://www.securityfocus.com/bid/36795
- http://www.vupen.com/english/advisories/2009/3014
EPSS
CVE ID
Связанные уязвимости
Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Snort before 2.8.5.1, when the -v option is enabled, allows remote att ...
EPSS