hmmm Anyone using Snort might want to have a look at the latest ISS Advisory. There is a vulnerability in Snort 1.8.0 - 1.9.0 in the RPC preprocessor, which may ultimately allow a remote attacker to execute arbitrary code on a vulnerable host.
Internet Security Systems Security Advisory Snort RPC Preprocessing Vulnerability http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21951 VG> BAD TRAFFIC loopback traffic [**] [Classification: Potentially Bad VG> Traffic] [Priority: 2] {UDP} 127.0.0.1:2301 -> 255.255.255.255:2301 -- Pentru dezabonare, trimiteti mail la [EMAIL PROTECTED] cu subiectul 'unsubscribe rlug'. REGULI, arhive si alte informatii: http://www.lug.ro/mlist/
