Buffer overflow in Snort allows remote execution of arbitrary code via fragmented RPC packets.
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | CVE-2003-0033 | 7 Mar 200305:00 | – | nvd |
![]() | CAN-2003-0033 | 6 Aug 202410:37 | – | cve |
![]() | CVE-2003-0033 | 1 Sep 200404:00 | – | cve |
![]() | CVE-2003-0033 | 1 Sep 200404:00 | – | cvelist |
![]() | Mandrake Linux Security Advisory : snort (MDKSA-2003:029) | 31 Jul 200400:00 | – | nessus |
![]() | Debian DSA-297-1 : snort - integer overflow, buffer overflow | 29 Sep 200400:00 | – | nessus |
![]() | [SECURITY] [DSA 297-1] New snort packages fix remote root exploits | 1 May 200313:12 | – | debian |
![]() | [SECURITY] [DSA 297-1] New snort packages fix remote root exploits | 1 May 200313:12 | – | debian |
![]() | Debian Security Advisory DSA 297-1 (snort) | 17 Jan 200800:00 | – | openvas |
![]() | Debian: Security Advisory (DSA-297) | 17 Jan 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 999 | all | snort | 2.0.0-1 | snort_2.0.0-1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo