IDS mailing list archives
Re: [Snort-2003-001] Buffer overflow in Snort RPC preprocessor
From: Martin Roesch <roesch () sourcefire com>
Date: Tue, 4 Mar 2003 15:29:26 -0500
The new Snort-1.9.1 RPC decoder has four new anomaly detection modes available that will pick up people trying to exploit this vulnerability, as well as other RPC anomalies.
-Marty On Tuesday, March 4, 2003, at 10:24 AM, Mike Shaw wrote:
I have to ask....is there a signature for this? ; )On Mon, 03 Mar 2003 15:53:56 -0800 Martin Roesch <roesch () sourcefire com> wrote:Snort Vulnerability Advisory [SNORT-2003-001]
-- Martin Roesch - Founder/CTO, Sourcefire Inc. - (410)290-1616 Sourcefire: Snort-based Enterprise Intrusion Detection Infrastructure roesch () sourcefire com - http://www.sourcefire.com Snort: Open Source Network IDS - http://www.snort.org ----------------------------------------------------------- <Pre>Lose another weekend managing your IDS? Take back your personal time. 15-day free trial of StillSecure Border Guard.</Pre> <A href="http://www.securityfocus.com/stillsecure"> http://www.securityfocus.com/stillsecure </A>
Current thread:
- [Snort-2003-001] Buffer overflow in Snort RPC preprocessor Martin Roesch (Mar 03)
- NOTE: [Snort-2003-001] Buffer overflow in Snort RPC preprocessor Martin Roesch (Mar 03)
- <Possible follow-ups>
- RE: [Snort-2003-001] Buffer overflow in Snort RPC preprocessor Geoff Craig (Mar 04)
- Re: [Snort-2003-001] Buffer overflow in Snort RPC preprocessor Martin Roesch (Mar 04)
- Re: [Snort-2003-001] Buffer overflow in Snort RPC preprocessor Martin Roesch (Mar 04)