[Snort-users] help for FTP EXPLOIT wu-ftpd 2.6.0 site exec overflow
cmg at ...671...
Fri Mar 23 11:19:28 EST 2001
Try using flags: PA; but the real solution is to upgrade ( preferably
to CVS or waiting for 1.7.1 ). The + was new to 1.7.0 I think.
Giving all the parameters will not work because then it will look for
an XMAS packet with everything set.
chandrasekhar radhakrishnan <chandru_stud at ...131...> writes:
> I have been using snort-1.6.3.I have tried to test the
> FTP exploit wu-ftpd 2.6.0 site exec overflow.The
> system has failed to detect this.
> Also does this version of snort not take the + option
> for FLAGS parameter.What is the solution to this ; can
> I give all the parameters-UAPRSF12.
Chris Green <cmg at ...671...>
Fame may be fleeting but obscurity is forever.
More information about the Snort-users