Lucene search

K
ciscoCiscoCISCO-SA-20170515-SNORT
HistoryMay 15, 2017 - 4:00 p.m.

Cisco Snort++ Protocol Decoder Denial of Service Vulnerabilities

2017-05-1516:00:00
tools.cisco.com
23

EPSS

0.001

Percentile

46.1%

Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote attacker to create a Denial of Service (DoS) condition.

The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the attacker to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped.

There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort”]

Affected configurations

Vulners
Node
ciscosnort\+\+Matchany
OR
ciscosnort\+\+Matchany
VendorProductVersionCPE
ciscosnort\+\+anycpe:2.3:a:cisco:snort\+\+:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

46.1%

Related for CISCO-SA-20170515-SNORT