Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Smoothwall | Smoothwall | 2.0_beta_4 (including) | 2.0_beta_4 (including) |
Snort | Sourcefire | 1.8 (including) | 1.8 (including) |
Snort | Sourcefire | 1.8.1 (including) | 1.8.1 (including) |
Snort | Sourcefire | 1.8.2 (including) | 1.8.2 (including) |
Snort | Sourcefire | 1.8.3 (including) | 1.8.3 (including) |
Snort | Sourcefire | 1.8.4 (including) | 1.8.4 (including) |
Snort | Sourcefire | 1.8.5 (including) | 1.8.5 (including) |
Snort | Sourcefire | 1.8.6 (including) | 1.8.6 (including) |
Snort | Sourcefire | 1.8.7 (including) | 1.8.7 (including) |
Snort | Sourcefire | 1.9 (including) | 1.9 (including) |
Snort | Sourcefire | 1.9.1 (including) | 1.9.1 (including) |