Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-1236

Опубликовано: 13 янв. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

esm-apps/bionic

needed

esm-apps/focal

needed

esm-apps/jammy

not-affected

2.9.15.1-5
esm-apps/noble

not-affected

2.9.15.1-5
esm-apps/xenial

needed

esm-infra-legacy/trusty

needed

focal

ignored

end of standard support, was needed
impish

not-affected

2.9.15.1-5

Показывать по

EPSS

Процентиль: 52%
0.00291
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 5 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.

CVSS3: 5.3
debian
около 5 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort a ...

CVSS3: 5.3
github
больше 3 лет назад

Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.

CVSS3: 4
fstec
около 5 лет назад

Уязвимость механизма обнаружения приложений системы обнаружения вторжений Snort, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 52%
0.00291
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3