[Bug 193809] CVE-2006-2769 Snort URIContent Rules Detection Evasion Vulnerability
bugzilla at redhat.com
bugzilla at redhat.com
Thu Jun 29 11:43:11 UTC 2006
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
Summary: CVE-2006-2769 Snort URIContent Rules Detection Evasion Vulnerability
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193809
dennis at ausil.us changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |CLOSED
Resolution| |CURRENTRELEASE
Fixed In Version| |2.6.0-1
------- Additional Comments From dennis at ausil.us 2006-06-29 07:34 EST -------
I was looking at thins last night. I have updated to 2.6.0 since and
according to snort.org its fixed there
Sourcefire is aware of a possible Snort evasion that exists in the
http_inspect preprocessor. This evasion case only applies to protected Apache
web servers. We have prepared fixes for both the 2.4 and 2.6 branches and will
have fully tested releases, including binaries, available for both on Monday,
June 5th.
Evasion Details:
The Apache web server supports special characters in HTTP requests that do
not affect the processing of the particular request. The current target-based
profiles for Apache in the http_inspect preprocessor do not properly handle
these requests, resulting in the possibility that an attacker can bypass
detection of rules that use the "uricontent" keyword by embedding special
characters in a HTTP request.
Background Information:
It is important to note that this is an evasion and not a vulnerability. This
means that while it is possible for an attacker to bypass detection, Snort
sensors and the networks they protect are not at a heightened risk of other
attacks.
Timeline:
Sourcefire has prepared fixes and is currently finalizing a complete round of
testing to ensure that the fixes not only solve the issue at hand but do not
create new bugs as well. The following releases, including binaries for Linux
and Windows deployments, will be available on Monday, June 5th:
* Snort v2.4.5
* Snort v2.6.0 final
Questions:
Any questions regarding these releases can be sent to
snort-team at sourcefire.com.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
More information about the Fedora-security-list
mailing list