Vulnerabilities > CVE-2003-0033 - Buffer Overflow vulnerability in Snort RPC Preprocessor Fragment Reassembly

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
snort
critical
nessus

Summary

Buffer overflow in the RPC preprocessor for Snort 1.8 and 1.9.x before 1.9.1 allows remote attackers to execute arbitrary code via fragmented RPC packets.

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-297.NASL
    descriptionTwo vulnerabilities have been discovered in Snort, a popular network intrusion detection system. Snort comes with modules and plugins that perform a variety of functions such as protocol analysis. The following issues have been identified : Heap overflow in Snort
    last seen2020-06-01
    modified2020-06-02
    plugin id15134
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15134
    titleDebian DSA-297-1 : snort - integer overflow, buffer overflow
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-029.NASL
    descriptionA buffer overflow was discovered in the snort RPC normalization routines by ISS-XForce which can cause snort to execute arbitrary code embedded within sniffed network packets. The rpc_decode preprocessor is enabled by default. The snort developers have released version 1.9.1 to correct this behaviour; snort versions from 1.8 up to 1.9.0 are vulnerable. For those unable to upgrade, you can disable the rpc_decode preprocessor by commenting out the line (place a
    last seen2020-06-01
    modified2020-06-02
    plugin id14013
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14013
    titleMandrake Linux Security Advisory : snort (MDKSA-2003:029)