Cisco Snort++ Protocol Decoder Denial of Service Vulnerabilities
Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote attacker to create a Denial of Service (DoS) condition.
The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
http://ift.tt/2qJNCKi Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote attacker to create a Denial of Service (DoS) condition.
The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
http://ift.tt/2qJNCKi
Security Impact Rating: Medium
CVE: CVE-2017-6657,CVE-2017-6658
from Cisco Security Advisory http://ift.tt/2qJNCKi
The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
http://ift.tt/2qJNCKi Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote attacker to create a Denial of Service (DoS) condition.
The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.
There are no workarounds that address these vulnerabilities.
This advisory is available at the following link:
http://ift.tt/2qJNCKi
Security Impact Rating: Medium
CVE: CVE-2017-6657,CVE-2017-6658
from Cisco Security Advisory http://ift.tt/2qJNCKi