Snort Exploit Close At Hand
Source: Sedurity Pipeline - Posted by Pax Dickinson   
Intrusion Detection Creating an exploit for the serious Snort intrusion detection system vulnerability announced earlier this week takes just two hours, a security researcher said Thursday, making it imperative that users patch or apply a work-around immediately.

"We're very close to full exploitation," wrote SANS Internet Storm Center (ISC) researcher Ed Skoudis Thursday. "Shut off that darn preprocessor ASAP. Check with your vendors if you suspect your commercial product may have Snort code."

Also on Thursday, another ISC researcher claimed he had assembled a working exploit against the Snort vulnerability in two hours, although he was not going to release it to the public.

Sourcefire, the developer of Snort, however, thinks that such dire warnings are unnecessary at this point. "It's more of a non-issue now," said Michele Perry, the head of marketing at Sourcefire. "All customers have had access to a patch [since Tuesday], or they've had instructions on how to turn off the preprocessor that's vulnerable."

Read this full article at Sedurity Pipeline

Only registered users can write comments.
Please login or register.

Powered by AkoComment!