CVE-2006-2769

The HTTP Inspect preprocessor (http_inspect) in Snort 2.4.0 through 2.4.4 allows remote attackers to bypass "uricontent" rules via a carriage return (\r) after the URL and before the HTTP declaration.
References
Link Resource
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html
http://marc.info/?l=snort-devel&m=114909074311462&w=2
http://secunia.com/advisories/20413 Vendor Advisory
http://secunia.com/advisories/20766 Vendor Advisory
http://securityreason.com/securityalert/1018
http://securitytracker.com/id?1016191 Exploit Patch
http://www.demarc.com/support/downloads/patch_20060531 Exploit Patch
http://www.osvdb.org/25837 Exploit Patch
http://www.securityfocus.com/archive/1/435600/100/0/threaded
http://www.securityfocus.com/archive/1/435734/100/0/threaded
http://www.securityfocus.com/archive/1/435797/100/0/threaded
http://www.securityfocus.com/archive/1/435872/100/0/threaded
http://www.securityfocus.com/bid/18200 Exploit Patch
http://www.snort.org/pub-bin/snortnews.cgi#431
http://www.vupen.com/english/advisories/2006/2119 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26855
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html
http://marc.info/?l=snort-devel&m=114909074311462&w=2
http://secunia.com/advisories/20413 Vendor Advisory
http://secunia.com/advisories/20766 Vendor Advisory
http://securityreason.com/securityalert/1018
http://securitytracker.com/id?1016191 Exploit Patch
http://www.demarc.com/support/downloads/patch_20060531 Exploit Patch
http://www.osvdb.org/25837 Exploit Patch
http://www.securityfocus.com/archive/1/435600/100/0/threaded
http://www.securityfocus.com/archive/1/435734/100/0/threaded
http://www.securityfocus.com/archive/1/435797/100/0/threaded
http://www.securityfocus.com/archive/1/435872/100/0/threaded
http://www.securityfocus.com/bid/18200 Exploit Patch
http://www.snort.org/pub-bin/snortnews.cgi#431
http://www.vupen.com/english/advisories/2006/2119 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/26855
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sourcefire:snort:2.4:*:*:*:*:*:*:*
cpe:2.3:a:sourcefire:snort:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:sourcefire:snort:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:sourcefire:snort:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:sourcefire:snort:2.4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html - () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html -
References () http://marc.info/?l=snort-devel&m=114909074311462&w=2 - () http://marc.info/?l=snort-devel&m=114909074311462&w=2 -
References () http://secunia.com/advisories/20413 - Vendor Advisory () http://secunia.com/advisories/20413 - Vendor Advisory
References () http://secunia.com/advisories/20766 - Vendor Advisory () http://secunia.com/advisories/20766 - Vendor Advisory
References () http://securityreason.com/securityalert/1018 - () http://securityreason.com/securityalert/1018 -
References () http://securitytracker.com/id?1016191 - Exploit, Patch () http://securitytracker.com/id?1016191 - Exploit, Patch
References () http://www.demarc.com/support/downloads/patch_20060531 - Exploit, Patch () http://www.demarc.com/support/downloads/patch_20060531 - Exploit, Patch
References () http://www.osvdb.org/25837 - Exploit, Patch () http://www.osvdb.org/25837 - Exploit, Patch
References () http://www.securityfocus.com/archive/1/435600/100/0/threaded - () http://www.securityfocus.com/archive/1/435600/100/0/threaded -
References () http://www.securityfocus.com/archive/1/435734/100/0/threaded - () http://www.securityfocus.com/archive/1/435734/100/0/threaded -
References () http://www.securityfocus.com/archive/1/435797/100/0/threaded - () http://www.securityfocus.com/archive/1/435797/100/0/threaded -
References () http://www.securityfocus.com/archive/1/435872/100/0/threaded - () http://www.securityfocus.com/archive/1/435872/100/0/threaded -
References () http://www.securityfocus.com/bid/18200 - Exploit, Patch () http://www.securityfocus.com/bid/18200 - Exploit, Patch
References () http://www.snort.org/pub-bin/snortnews.cgi#431 - () http://www.snort.org/pub-bin/snortnews.cgi#431 -
References () http://www.vupen.com/english/advisories/2006/2119 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2119 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26855 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26855 -

Information

Published : 2006-06-02 10:18

Updated : 2024-11-21 00:12


NVD link : CVE-2006-2769

Mitre link : CVE-2006-2769

CVE.ORG link : CVE-2006-2769


JSON object : View

Products Affected

sourcefire

  • snort
CWE
CWE-264

Permissions, Privileges, and Access Controls