Описание
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0209
- http://marc.info/?l=bugtraq&m=105043563016235&w=2
- http://marc.info/?l=bugtraq&m=105103586927007&w=2
- http://marc.info/?l=bugtraq&m=105111217731583&w=2
- http://marc.info/?l=bugtraq&m=105154530427824&w=2
- http://marc.info/?l=bugtraq&m=105172790914107&w=2
- http://www.cert.org/advisories/CA-2003-13.html
- http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10
- http://www.debian.org/security/2003/dsa-297
- http://www.kb.cert.org/vuls/id/139129
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:052
- http://www.securityfocus.com/bid/7178
EPSS
Процентиль: 98%
0.64409
Средний
CVE ID
Связанные уязвимости
nvd
около 22 лет назад
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
debian
около 22 лет назад
Integer overflow in the TCP stream reassembly module (stream4) for Sno ...
EPSS
Процентиль: 98%
0.64409
Средний