Описание
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2003-0209
- http://marc.info/?l=bugtraq&m=105043563016235&w=2
- http://marc.info/?l=bugtraq&m=105103586927007&w=2
- http://marc.info/?l=bugtraq&m=105111217731583&w=2
- http://marc.info/?l=bugtraq&m=105154530427824&w=2
- http://marc.info/?l=bugtraq&m=105172790914107&w=2
- http://www.cert.org/advisories/CA-2003-13.html
- http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10
- http://www.debian.org/security/2003/dsa-297
- http://www.kb.cert.org/vuls/id/139129
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:052
- http://www.securityfocus.com/bid/7178
EPSS
Процентиль: 98%
0.57434
Средний
CVE ID
Связанные уязвимости
nvd
почти 23 года назад
Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
debian
почти 23 года назад
Integer overflow in the TCP stream reassembly module (stream4) for Sno ...
EPSS
Процентиль: 98%
0.57434
Средний