Snort Time To Live Fragment Reassembly Security Bypass Weakness

Snort is prone to a security-bypass weakness because of a design error affected by the Time To Live values of disassembled network packets.

Attackers can exploit this issue to bypass all Snort rules. This may facilitate further attacks.

This issue affects Snort 2.8 and 2.6 on multiple platforms.


Privacy Statement
Copyright 2010, SecurityFocus