Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://marc.info/?l=bugtraq&m=105103586927007&w=2 | mailing-list x_refsource_BUGTRAQ |
| http://www.securityfocus.com/bid/7178 | vdb-entry x_refsource_BID |
| http://www.cert.org/advisories/CA-2003-13.html | third-party-advisory x_refsource_CERT |
| http://marc.info/?l=bugtraq&m=105043563016235&w=2 | mailing-list x_refsource_BUGTRAQ |
| http://marc.info/?l=bugtraq&m=105172790914107&w=2 | vendor-advisory x_refsource_ENGARDE |
| http://www.kb.cert.org/vuls/id/139129 | third-party-advisory x_refsource_CERT-VN |
| http://www.debian.org/security/2003/dsa-297 | vendor-advisory x_refsource_DEBIAN |
| http://marc.info/?l=bugtraq&m=105111217731583&w=2 | mailing-list x_refsource_BUGTRAQ |
| http://www.mandriva.com/security/advisories?name=MDKSA-2003:052 | vendor-advisory x_refsource_MANDRAKE |
| http://www.coresecurity.com/common/showdoc.php?idx=313&idxseccion=10 | x_refsource_MISC |
| http://marc.info/?l=bugtraq&m=105154530427824&w=2 | mailing-list x_refsource_BUGTRAQ |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|