CVE-2009-3641

Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:snort:snort:*:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.6:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.9.0:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.0:beta:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.7_beta1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.3.4:*:*:*:*:*:*:*
cpe:2.3:a:snort:snort:2.8.3.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://dl.snort.org/snort-current/release_notes_2851.txt - Vendor Advisory () http://dl.snort.org/snort-current/release_notes_2851.txt - Vendor Advisory
References () http://marc.info/?l=oss-security&m=125649553414700&w=2 - () http://marc.info/?l=oss-security&m=125649553414700&w=2 -
References () http://seclists.org/fulldisclosure/2009/Oct/299 - Exploit, Patch () http://seclists.org/fulldisclosure/2009/Oct/299 - Exploit, Patch
References () http://secunia.com/advisories/37135 - Vendor Advisory () http://secunia.com/advisories/37135 - Vendor Advisory
References () http://securitytracker.com/id?1023076 - () http://securitytracker.com/id?1023076 -
References () http://vrt-sourcefire.blogspot.com/2009/10/snort-2851-release.html - Patch () http://vrt-sourcefire.blogspot.com/2009/10/snort-2851-release.html - Patch
References () http://www.openwall.com/lists/oss-security/2009/10/25/5 - () http://www.openwall.com/lists/oss-security/2009/10/25/5 -
References () http://www.osvdb.org/59159 - () http://www.osvdb.org/59159 -
References () http://www.securityfocus.com/bid/36795 - Exploit, Patch () http://www.securityfocus.com/bid/36795 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2009/3014 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/3014 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=530863 - Exploit () https://bugzilla.redhat.com/show_bug.cgi?id=530863 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/53912 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/53912 -

Information

Published : 2009-10-28 14:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3641

Mitre link : CVE-2009-3641

CVE.ORG link : CVE-2009-3641


JSON object : View

Products Affected

snort

  • snort