FreeBSD : snort -- DCE/RPC preprocessor vulnerability (afdf500f-c1f6-11db-95c5-000c6ec775d9)

Critical Nessus Plugin ID 24686


The remote FreeBSD host is missing a security-related update.


A IBM Internet Security Systems Protection Advisory reports :

Snort is vulnerable to a stack-based buffer overflow as a result of DCE/RPC reassembly. This vulnerability is in a dynamic-preprocessor enabled in the default configuration, and the configuration for this preprocessor allows for auto-recognition of SMB traffic to perform reassembly on. No checks are performed to see if the traffic is part of a valid TCP session, and multiple Write AndX requests can be chained in the same TCP segment. As a result, an attacker can exploit this overflow with a single TCP PDU sent across a network monitored by Snort or Sourcefire.

Snort users who cannot upgrade immediately are advised to disable the DCE/RPC preprocessor by removing the DCE/RPC preprocessor directives from snort.conf and restarting Snort. However, be advised that disabling the DCE/RPC preprocessor reduces detection capabilities for attacks in DCE/RPC traffic. After upgrading, customers should re-enable the DCE/RPC preprocessor.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 24686

File Name: freebsd_pkg_afdf500fc1f611db95c5000c6ec775d9.nasl

Version: $Revision: 1.20 $

Type: local

Published: 2007/02/22

Modified: 2013/11/19

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:snort, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/02/21

Vulnerability Publication Date: 2007/02/19

Exploitable With


Core Impact

Metasploit (Snort 2 DCE/RPC Preprocessor Buffer Overflow)

Reference Information

CVE: CVE-2006-5276

CERT: 196240