Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA297] DSA-297-1 snort


Vulnerability Assessment Details

[DSA297] DSA-297-1 snort

Vulnerability Assessment Summary
DSA-297-1 snort

Detailed Explanation for this Vulnerability Assessment

Two vulnerabilities have been discovered in Snort, a popular network
intrusion detection system. Snort comes with modules and tests that
perform a variety of functions such as protocol analysis. The
following issues have been identified:
For the stable distribution (woody) these problems have been fixed in
version 1.8.4beta1-3.1.
The old stable distribution (potato) is not affected by these problems
since it doesn't contain the problematic code.
For the unstable distribution (sid) these problems have been fixed in
version 2.0.0-1.
We recommend that you upgrade your snort package immediately.
You are also advised to upgrade to the most recent version of Snort,
since Snort, as any intrusion detection system, is rather useless if
it is based on old and out-dated data and not kept up to date. Such
installations would be unable to detect intrusions using modern
methods. The current version of Snort is 2.0.0, while the version in
the stable distribution (1.8) is quite old and the one in the old
stable distribution is beyond hope.
Since Debian does not update arbitrary packages in stable releases,
even Snort is not going to see updates other than to fix security
problems, you are advised to upgrade to the most recent version from
third party sources.
The Debian maintainer for Snort provides backported up-to-date
packages for woody (stable) and potato (oldstable) for cases where you
cannot upgrade your entire system. These packages are untested,
though and only exist for the i386 architecture:

deb http://people.debian.org/~ssmeenk/snort-stable-i386/ ./
deb-src http://people.debian.org/~ssmeenk/snort-stable-i386/ ./

deb http://people.debian.org/~ssmeenk/snort-oldstable-i386/ ./
deb-src http://people.debian.org/~ssmeenk/snort-oldstable-i386/ ./




Solution : http://www.debian.org/security/2003/dsa-297
Network Security Threat Level: High

Networks Security ID: 6963, 7178

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

DELL POWEREDGE R630 8 BAY E5-2603V3 1.6GHZ 96GB 6 X 1TB SATA H730
$3069.0
DELL POWEREDGE R630 8 BAY E5-2603V3 1.6GHZ 96GB 6 X 1TB SATA H730 pictureDELL POWEREDGE R630 8 BAY E5-2670V3 2.3GHZ 128GB 1TB SAS H730
$5249.0
DELL POWEREDGE R630 8 BAY E5-2670V3 2.3GHZ 128GB 1TB SAS H730 pictureDELL POWEREDGE R630 8 BAY E5-2698V3 2.3GHZ 64GB 5 X 1TB SATA H730
$5699.0
DELL POWEREDGE R630 8 BAY E5-2698V3 2.3GHZ 64GB 5 X 1TB SATA H730 pictureDELL POWEREDGE R730XD SERVER 24 BAY E5-2643V3 3.4GHZ 4GB 12 X 1TB SATA H730
$4789.0
DELL POWEREDGE R730XD SERVER 24 BAY E5-2643V3 3.4GHZ 4GB 12 X 1TB SATA H730 picture


Discussions

No Discussions have been posted on this vulnerability.