*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: snort

CVE-2008-1804 description:

"Remote exploitation of a design error vulnerability in Snort [...]
could allow an attacker to bypass filter rules.

Due to a design error vulnerability, Snort does not properly reassemble 
fragmented IP packets. When receiving incoming fragments, Snort checks the Time 
To Live (TTL) value of the fragment, and compares it to the TTL of the initial 
fragment. If the difference between the initial fragment and the following 
fragments is more than a configured amount, the fragments will be silently 
discard. This results in valid traffic not being examined and/or filtered by 
Snort."
[...]
"iDefense has confirmed the existence of this vulnerability in Snort 2.8 and 
2.6. Snort 2.4 is not vulnerable. "

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=701

"preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not
properly identify packet fragments that have dissimilar TTL values,
which allows remote attackers to bypass detection rules by using a
different TTL for each fragment."

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1804

** Affects: snort (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1804

-- 
[CVE-2008-1804] Snort IP fragment TTL evasion vulnerability
https://bugs.launchpad.net/bugs/235901
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to