[Snort-devel] [ snort-Bugs-733413 ] stream4/frag2: integer overflow leads to corrupt reassembly

SourceForge.net noreply at ...12...
Wed May 7 07:37:08 EDT 2003


Bugs item #733413, was opened at 2003-05-06 10:29
Message generated for change (Tracker Item Submitted) made by Item Submitter
You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=103357&aid=733413&group_id=3357

Category: None
Group: None
Status: Open
Resolution: None
Priority: 5
Submitted By: Nobody/Anonymous (nobody)
Assigned to: Nobody/Anonymous (nobody)
Summary: stream4/frag2: integer overflow leads to corrupt reassembly

Initial Comment:
This is related to the sanity checking in the stream4
and frag2 preprocessors.  Protecting against integer
overflows in SafeMemcpy() returns before dangerous
memcpy(), which is safe, but returns corrupted packets
and streams.  This happens silently if not in DEBUG mode.

Submitted by:
matt-snort (at) securepipe (dot) com

----------------------------------------------------------------------

You can respond by visiting: 
https://sourceforge.net/tracker/?func=detail&atid=103357&aid=733413&group_id=3357




More information about the Snort-devel mailing list