Package: snort
Severity: important

According to the advisory at
http://www.frsirt.com/english/advisories/2005/1721 (also mentioned on the
snort site at http://www.snort.org/pub-bin/snortnews.cgi#58), versions <= 2.4
of snort, without the relevant patch, are vulnerable to a DoS when snort's run
in verbose mode. As it is uncommon that it be run in this mode in production
situations, this will not affect many people, but it is a security issue none
the less.

I believe this adds weight to the argument for an update to v2.4 and 
beyond (see #320920).


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to