Cisco Sourcefire Snort 3.0 before build 233 mishandles Ether Type Validation. Since valid ether type and IP protocol numbers do not overlap, Snort++ stores all protocol decoders in a single array. That makes it possible to craft packets that have IP protocol numbers in the ether type field which will confuse the Snort++ decoder. For example, an eth:llc:snap:icmp6 packet will cause a crash because there is no ip6 header with which to calculate the icmp6 checksum. Affected decoders include gre, llc, trans_bridge, ciscometadata, linux_sll, and token_ring. The fix adds a check in the packet manager to validate the ether type before indexing the decoder array. An out of range ether type will raise 116:473.
References
Link | Resource |
---|---|
http://blog.snort.org/2017/05/snort-vulnerabilities-found.html | Third Party Advisory |
http://www.securitytracker.com/id/1038483 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort | Vendor Advisory |
http://blog.snort.org/2017/05/snort-vulnerabilities-found.html | Third Party Advisory |
http://www.securitytracker.com/id/1038483 |
Configurations
History
21 Nov 2024, 03:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.snort.org/2017/05/snort-vulnerabilities-found.html - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1038483 - |
Information
Published : 2017-05-16 17:29
Updated : 2024-11-21 03:30
NVD link : CVE-2017-6657
Mitre link : CVE-2017-6657
CVE.ORG link : CVE-2017-6657
JSON object : View
Products Affected
cisco
- snort\+\+
CWE