Snort update for Gentoo
Posted on: 03/06/2003 10:09 PM

A new security update for Gentoo Linux has been released

PACKAGE : snort

Remote attackers may exploit the buffer overflow condition to run arbitrary code on a Snort sensor with the privileges of the Snort IDS process, which typically runs as the superuser. The vulnerable preprocessor is enabled by default. It is not necessary to establish an actual connection to a RPC portmapper service to exploit this vulnerability.

Read more




Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/snort_update_for_gentoo.html)