Multiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
{
"binaries": [
{
"binary_name": "snort",
"binary_version": "2.9.6.0-0ubuntu1"
},
{
"binary_name": "snort-common",
"binary_version": "2.9.6.0-0ubuntu1"
},
{
"binary_name": "snort-common-libraries",
"binary_version": "2.9.6.0-0ubuntu1"
},
{
"binary_name": "snort-rules-default",
"binary_version": "2.9.6.0-0ubuntu1"
}
]
}
{
"binaries": [
{
"binary_name": "snort",
"binary_version": "2.9.7.0-5"
},
{
"binary_name": "snort-common",
"binary_version": "2.9.7.0-5"
},
{
"binary_name": "snort-common-libraries",
"binary_version": "2.9.7.0-5"
},
{
"binary_name": "snort-rules-default",
"binary_version": "2.9.7.0-5"
}
]
}
{
"binaries": [
{
"binary_name": "snort",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-common",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-common-libraries",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-rules-default",
"binary_version": "2.9.7.0-5build1"
}
]
}
{
"binaries": [
{
"binary_name": "snort",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-common",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-common-libraries",
"binary_version": "2.9.7.0-5build1"
},
{
"binary_name": "snort-rules-default",
"binary_version": "2.9.7.0-5build1"
}
]
}