Upstream information

CVE-2005-3252 at MITRE

Description

Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort before 2.4.3 allows remote attackers to execute arbitrary code via a crafted UDP packet.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 129047 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE LINUX 10.0
  • snort >= 2.3.3-2.2
SuSE Linux 9.0 for AMD64
SuSE Linux 9.0 for IA32
  • snort >= 2.3.2-10
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • snort >= 2.3.2-0.7
SUSE LINUX 9.2
SUSE LINUX 9.3
  • snort >= 2.3.2-0.4
SUSE LINUX Retail Solution 8
SuSE Linux Enterprise Server 8 for AMD64
SuSE Linux Enterprise Server 8 for IBM iSeries and IBM pSeries
SuSE Linux Enterprise Server 8 for IBM zSeries
SuSE Linux Enterprise Server 8 for IPF
SuSE Linux Openexchange Server 4
SuSE Linux School Server for i386
SuSE Linux Standard Server 8
UnitedLinux 1.0
  • snort >= 2.3.2-10
sles9-oes.x86
core9.ia64
core9.ppc
core9.s390
slox4,2.x86
core9.x86-64
YOU Patch Nr: 10562
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • snort >= 2.3.2-0.7
sles9-oes.x86
core9.ia64
core9.ppc
core9.s390
slox4,2.x86
core9.x86-64
YOU Patch Nr: 10562