[ISN] Sourcefire discloses buffer-overflow vulnerability in Snort
InfoSec News
isn at c4i.org
Wed Oct 19 03:02:27 EDT 2005
http://www.networkworld.com/news/2005/101805-snort.html
By Ellen Messmer
NetworkWorld.com
10/18/05
Sourcefire, which oversees the open-source intrusion-detection system
Snort and makes commercial products based on it, Tuesday disclosed a
major vulnerability in Snort along with corrective measures to
mitigate the risk.
Snort versions 2.4.0 and higher are subject to a buffer-overflow
vulnerability that would let an attacker execute code remotely on a
Snort sensor when the Back Orifice preprocessor is running, resulting
in complete compromise of Snort. The Back Orifice preprocessor is the
Snort functionality for detecting any activity associated with the
malicious back-door code Back Orifice.
Jennifer Steffens, Sourcefire's director of product management, said
there are two ways Sourcefire is advising Snort users and Sourcefire
customers to eliminate the problem. Details about the vulnerability
and mitigation instructions from Sourcefire are here [1].
Sourcefire is urging users to install an updated version of Snort
released Tuesday, Snort v. 2.4.3, to correct the problem. If it's not
feasible for Snort users or Sourcefire customers to immediately update
the new version that corrects the buffer-overflow vulnerability, then
they should consider disabling the Back Orifice preprocessor function.
"But then they wouldn't be able to detect Back Orifice activity,"
Steffens added.
The flaw associated with Snort's Back Orifice preprocessor is only the
second major vulnerability to be discovered in Snort for the past two
years, she added.
The Snort vulnerability was first uncovered by Internet Security
Systems (ISS), which reported it directly to US-CERT, which
transmitted the information to Sourcefire. Snort information from
US-CERT can be found here [2].
Steffens said Sourcefire heard about it on Oct. 13 and spent the
weekend testing for it and coming up with a fix. There are an
undisclosed number of Sourcefire customers and about 100,000 users of
open-source Snort.
Neel Mehta, team lead at the ISS X-Force research and development
division, which investigates security weaknesses throughout a wide
variety of vendor products, said ISS discovered the Snort
vulnerability while doing routine testing.
"It's trivial to exploit," Mehta claims. "Anyone who does
vulnerability testing can do this. It's a buffer overflow that is
triggered with a single UDP packet. It would make it easy for worms to
exploit this."
Mehta said ISS took its concerns directly to US-CERT, the group
responsible for alerting government agencies and the public, "asking
them to do the coordination on this since there are a wide number of
Snort users."
"We saw it as an infrastructure issue," says Mehta.
[1] http://www.snort.org/rules/advisories/snort_update_20051018.html
[2] http://www.kb.cert.org/vuls/id/MIMG-6H6P65
More information about the ISN
mailing list