{"vuid":"VU#196240","idnumber":"196240","name":"Sourcefire Snort DCE/RPC preprocessor does not properly reassemble fragmented packets","keywords":["snort","ids","buffer overflow","smb","rpc","dce","sourcefire","dcerpc","cert-seccode:ARR33-C","INFO#111001"],"overview":"A vulnerability in the Sourcefire Snort DCE/RPC preprocessor may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"Sourcefire Snort is a widely-deployed, open-source network intrusion detection system (IDS). Snort and its components are used in other IDS products, notably Sourcefire, and Snort is included with a number of operating system distributions. Snort preprocessors are modular plugins that extend functionality by operating on packets before the detection engine is run. The DCE/RPC preprocessor reassembles fragmented SMB and DCE/RPC packets so that Snort rules operate on a complete packet. The preprocessor does not properly reassemble SMB Write AndX commands, creating a stack buffer overflow vulnerability. The DCE/RPC preprocessor is enabled by default and dynamically detects SMB traffic. An attacker does not have to complete a full TCP connection to exploit this vulnerability. According to ISS: This vulnerability is in a dynamic-preprocessor enabled in the default configuration, and the configuration for this preprocessor allows for auto-recognition of SMB traffic to perform reassembly on. No checks are performed to see if the traffic is part of a valid TCP session, and multiple Write AndX requests can be chained in the same TCP segment. As a result, an attacker can exploit this overflow with a single TCP PDU sent across a network monitored by Snort or Sourcefire. Note that this issue affects the following systems: Snort 2.6.1, 2.6.1.1, and 2.6.1.2\nSnort 2.7.0 beta 1\nSourcefire Intrusion Sensors versions 4.1.x, 4.5.x, and 4.6.x with SEUs prior to SEU 64\nSourcefire Intrusion Sensor Software for Crossbeam versions 4.1.x, 4.5.x and 4.6.x with SEUs prior to SEU 64\nExploit code for this vulnerability is publicly available. This vulnerability occurred as a result of violating rule ARR33-C of the CERT Secure Coding Standard.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privilege level of the Snort preprocessor. In most cases this would allow an attacker to compromise the system running Snort.","resolution":"Upgrade\nSourcefire has released Snort 2.6.1.3 which is available from the Snort download site. See Snort document 2007-02-19 for more details. Sourcefire customers should see Sourcefire Support Login for more details on updates.","workarounds":"Disable the preprocessor Disable the DCE/RPC preprocessor (","sysaffected":"","thanks":"This vulnerability was reported and researched by Neel Mehta from IBM ISS X-Force.","author":"This document was written by Chris Taschner and Art Manion.","public":["http://www.snort.org/docs/advisory-2007-02-19.html","https://support.sourcefire.com/","http://iss.net/threats/257.html","http://www.snort.org/docs/snort_htmanuals/htmanual_261/node104.html","http://www.snort.org/docs/release_notes/release_notes_2613.txt","http://www.snort.org/dl/","http://secunia.com/advisories/24235/","http://secunia.com/advisories/24190/","http://secunia.com/advisories/24272/","http://www.securityfocus.com/bid/22616"],"cveids":["CVE-2006-5276"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2020-05-21T16:13:39.132626Z","publicdate":"2007-02-19T00:00:00Z","datefirstpublished":"2007-02-19T20:58:25Z","dateupdated":"2008-01-30T20:45:09Z","revision":44,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":"N/A","cvss_basevector":"N/A","cvss_temporalscore":"N/A","cvss_environmentalscore":"N/A","cvss_environmentalvector":"N/A","metric":23.625,"vulnote":null}