Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Smoothwall | Smoothwall | 2.0_beta_4 | 2.0_beta_4 |
Snort | Sourcefire | 1.8 | 1.8 |
Snort | Sourcefire | 1.8.1 | 1.8.1 |
Snort | Sourcefire | 1.8.2 | 1.8.2 |
Snort | Sourcefire | 1.8.3 | 1.8.3 |
Snort | Sourcefire | 1.8.4 | 1.8.4 |
Snort | Sourcefire | 1.8.5 | 1.8.5 |
Snort | Sourcefire | 1.8.6 | 1.8.6 |
Snort | Sourcefire | 1.8.7 | 1.8.7 |
Snort | Sourcefire | 1.9 | 1.9 |
Snort | Sourcefire | 1.9.1 | 1.9.1 |