search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Buffer overflow in Snort RPC preprocessor

Vulnerability Note VU#916785

Original Release Date: 2003-03-03 | Last Revised: 2003-05-20

Overview

There is a buffer overflow vulnerability in the RPC preprocessing feature of Snort versions 1.8 through 1.9.0 and 2.0 beta.

Description

Martin Roesch, the primary Snort developer, described the vulnerability by saying:

When the RPC decoder normalizes fragmented RPC records, it incorrectly checks the lengths of what is being normalized against the current packet size, leading to an overflow condition. The RPC preprocessor is enabled by default.

The ISS X-Force team has published an advisory with additional information on this issue:

http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951

Information about this vulnerability can also be found on the Snort web site at:

http://www.snort.org/

Impact

A remote attacker can execute arbitrary code as the user running the Snort process, usually root. The attacker does not need to send packets directly to the Snort sensor. It is sufficient to send packets to any of the hosts on the network monitored by Snort.

Solution

Upgrade to Snort version 1.9.1


Upgrade to Snort version 1.9.1 to correct this vulnerability. This version of snort is available at:

Disable the rpc_decode preprocessor

You can prevent exploitation of this vulnerability by commenting out the rpc_decode preprocessor in the "snort.conf" configuration file. Note that this change may affect your ability to correctly process RPC record fragments.

Block outbound packets from Snort IDS systems

You may be able limit an attacker's capabilities if the system is compromised by blocking all outbound traffic from the Snort sensor. While this workaround will not prevent exploitation of the vulnerability, it may make it more difficult for the attacker to create a useful exploit.

Vendor Information

916785
 

View all 33 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to ISS X-Force for discovering this vulnerability, and to Martin Roesch for his assistance in developing this document.

This document was written by Cory F. Cohen.

Other Information

CVE IDs: CVE-2003-0033
CERT Advisory: CA-2003-13
Severity Metric: 6.41
Date Public: 2003-03-03
Date First Published: 2003-03-03
Date Last Updated: 2003-05-20 01:02 UTC
Document Revision: 21

Sponsored by CISA.