[Snort-sigs] Sourcefire VRT Certified Snort Rules Update

research at ...435... research at ...435...
Thu Jul 16 16:23:43 EDT 2009


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Sourcefire VRT Certified Snort Rules Update

Synopsis:
The Sourcefire VRT is aware of a vulnerability affecting the ISC
DHCLIENT daemon.

Details:
ISC DHCLIENT Buffer Overflow (CVE-2009-0692):
The ISC DHCLIENT daemon suffers from a programming error that may allow
a remote attacker to capitalize on a stack overflow and execute code on
an affected machine.

A rule to detect attacks targeting this vulnerability is included in
this release and is identified with GID 3, SID 15700.

For a complete list of new and modified rules please see:

http://www.snort.org/vrt/docs/ruleset_changelogs/changes-2009-07-16.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFKX4IuQcQOxItLLaMRAqORAJ95rVcDN0n8DQeoxhxh4MoksIEMWgCdFF2Q
yMrbzDMkreYPkN1vJRm+570=
=nOns
-----END PGP SIGNATURE-----




More information about the Snort-sigs mailing list