By Gregg Keizer
February 20, 2007
A flaw in Snort, the popular open-source intrusion detection system,
could be used by attackers to run malicious code on vulnerable machines,
several security organizations reported yesterday.
The stack buffer overflow bug is in the Snort (or Sourcefire) DCE/RPC
preprocessor, said Neel Mehta, a member of IBM's Internet Security
Systems X-Force research team. Mehta discovered the vulnerability, which
could result in compromised or hijacked computers.
Danish vulnerability tracker Secunia rated the threat as "highly
critical," the second-most-serious ranking in its 1-through-5 scoring
Several versions of Snort, which is the foundation of Sourcefire's
security appliance line, are at risk, according to other advisories
posted by US-CERT  and the SANS Institute's Internet Storm Center.
The vulnerable versions include Snort 2.6.1, 220.127.116.11, 18.104.22.168, and 2.7.0
Sourcefire urged users  of Snort 2.6.1.x to update to Version 22.214.171.124
"immediately"; if upgrading isn't feasible, the DCE/RPC preprocessor
should be disabled. Instructions for disabling the preprocessor are
available online .
No working exploit for the vulnerability has been spotted yet,
Subscribe to the InfoSec News RSS Feed