Follow

RBSA-2016-001

ID: RBSA-2016-001
Name: Vulnerability in Snort related to file inspection
Date: 03/30/2016
CVE names: CVE-2016-1345
Status: Solved by vendor

Summary

A ‘Improper Input Validation’ vulnerability has been discovered in the Snort file inspection features. The vulnerability, which has been identified as CVE-2016-1345, has a high level impact according to the CVSS v3 Base Score.

Description

Snort versions prior to 2.9.8.2 which use the file inspection features are affected and exposed to this risk. These features were introduced in Snort v2.9.6.0 to help to deter malware propagation.

The vulnerability has been classified as ‘Improper Input Validation’ (CWE-20), which means that the program could not be able to validate some improper inputs correctly. Specifically, Snort risks to make an incorrect data validation of HTTP Headers, thereby an attacker could send a crafted HTTP request for the purpose of avoiding the file detection and therefore being able to spread malware.

Snort versions from 2.9.6.0 to 2.9.8.0 are in risk only in the case of file inspection features are enabled, therefore redborder IPS is not affected by this vulnerability.

Affected systems

Snort versions from 2.9.6.0 to 2.9.8.0 inclusive with file inspection features enabled.

Workaround

There is no workaround available.

Solution

For Snort installations with file inspection features enabled, upgrade to Snort v2.9.8.2. For redborder IPS installations no action is needed.

References

Cisco - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160330-fp
CVE-2016-1345 - https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1345

Contact

The redBorder CSIRT Group: csirt@redBorder.net

Have more questions? Submit a request

Comments

Powered by Zendesk