FreeBSD : snort -- Back Orifice preprocessor buffer overflow vulnerability (97d45e95-3ffc-11da-a263-0001020eed82)

high Nessus Plugin ID 21481

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Jennifer Steffens reports :

The Back Orifice preprocessor contains a stack-based buffer overflow.
This vulnerability could be leveraged by an attacker to execute code remotely on a Snort sensor where the Back Orifice preprocessor is enabled. However, there are a number of factors that make remote code execution difficult to achieve across different builds of Snort on different platforms, even on the same platform with different compiler versions, and it is more likely that an attacker could use the vulnerability as a denial of service attack.

The Back Orifice preprocessor can be disabled by commenting out the line 'preprocessor bo' in snort.conf. This can be done in any text editor using the following procedure :

- Locate the line 'preprocessor bo'

- Comment out this line by preceding it with a hash (#). The new line will look like '#preprocessor bo'

- Save the file

- Restart snort

Solution

Update the affected package.

See Also

http://www.nessus.org/u?4bccebc1

http://www.nessus.org/u?365e2313

http://www.nessus.org/u?f34c188b

Plugin Details

Severity: High

ID: 21481

File Name: freebsd_pkg_97d45e953ffc11daa2630001020eed82.nasl

Version: 1.16

Type: local

Published: 5/13/2006

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:snort, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/18/2005

Vulnerability Publication Date: 10/18/2005

Reference Information

CERT: 175500