-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 10 Aug 2006 00:44:36 +0200
Source: snort
Binary: snort-mysql snort-doc snort-rules-default snort-common snort-pgsql snort
Architecture: source i386 all
Version: 2.3.3-8
Distribution: unstable
Urgency: medium
Maintainer: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Changed-By: Javier Fernandez-Sanguino Pen~a <[EMAIL PROTECTED]>
Description: 
 snort      - Flexible Network Intrusion Detection System
 snort-common - Flexible Network Intrusion Detection System [common files]
 snort-doc  - Documentation for the Snort IDS [documentation]
 snort-mysql - Flexible Network Intrusion Detection System [MySQL]
 snort-pgsql - Flexible Network Intrusion Detection System [PostgreSQL]
 snort-rules-default - Flexible Network Intrusion Detection System ruleset
Closes: 381726
Changes: 
 snort (2.3.3-8) unstable; urgency=medium
 .
   * Fix security issue CVE-2006-2769, potential evasion in URI content
     buffers. This evasion only applies to Apache protected servers since
     that server supports some characters. The patch used is from 2.4.5
     and is *not* the one provided by Demarc (which is not fully
     comprehensive and is much more intrusive).
     Since this is an evasion issue and not a real security issue
     thus the 'medium' urgency even though it fixes security bug (Closes:
     #381726)
 .
     From upstream (snort.org webpage, News item "Possible Evasion in
     http_inspect"):
 .
      «The Apache web server supports special characters in HTTP requests that
      do not affect the processing of the particular request. The current
      target-based profiles for Apache in the http_inspect preprocessor do not
      properly handle these requests, resulting in the possibility that an
      attacker can bypass detection of rules that use the "uricontent" keyword
      by embedding special characters in a HTTP request.»
 .
      «It is important to note that this is an evasion and not a vulnerability.
      This means that while it is possible for an attacker to bypass detection,
      Snort sensors and the networks they protect are not at a heightened risk
      of other attacks.»
 .
   * Backport fix of another (different) potential evasion in Stream4 (also in
     the Snort 2.4.5 release, no CVE name)
   * Relocate Czech translation, it was not under debian/po
   * Add a warning in /etc/default/snort that the SNORT_USER will be
     modified (with usermod) every time you reinstall the package
     (don't change it to 'root'!)
Files: 
 5815a2ce3d8dc39fec057394fce1081e 961 net optional snort_2.3.3-8.dsc
 6cfe673ee3abbdf96d5003fec30527a4 350526 net optional snort_2.3.3-8.diff.gz
 24ee623d75c35c83514efe797997c759 94450 net optional 
snort-common_2.3.3-8_all.deb
 27f0b6579372d7aefc8889ee69f12fac 1800212 doc optional snort-doc_2.3.3-8_all.deb
 932993d0f895485512c1f976ff6ae402 233212 net optional 
snort-rules-default_2.3.3-8_all.deb
 db30e71458afba97b1c363675b4a98c0 358890 net optional snort_2.3.3-8_i386.deb
 705fd479250a20cc875f60ca83be25c5 365824 net extra snort-mysql_2.3.3-8_i386.deb
 e14329f507a72b07708c4144368f0609 365098 net optional 
snort-pgsql_2.3.3-8_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iQCVAwUBRNp1jPtEPvakNq0lAQJ6ygQAqohT7fCplPjPJBRZG2TYDTEuHaALknvC
bPikj1gUa+1Wy8QQeApJLpUqIMDIriTM9CA0+5OXc7npl59EymjhfwtKl2PpP0aP
W93GRhw7bQc9GkEXMD/9AWTBO57qNE3lvKJhOUCby9SE2x9MYTgZtJGWReFT8MfF
8QpKZA8jQH8=
=rpyL
-----END PGP SIGNATURE-----


Accepted:
snort-common_2.3.3-8_all.deb
  to pool/main/s/snort/snort-common_2.3.3-8_all.deb
snort-doc_2.3.3-8_all.deb
  to pool/main/s/snort/snort-doc_2.3.3-8_all.deb
snort-mysql_2.3.3-8_i386.deb
  to pool/main/s/snort/snort-mysql_2.3.3-8_i386.deb
snort-pgsql_2.3.3-8_i386.deb
  to pool/main/s/snort/snort-pgsql_2.3.3-8_i386.deb
snort-rules-default_2.3.3-8_all.deb
  to pool/main/s/snort/snort-rules-default_2.3.3-8_all.deb
snort_2.3.3-8.diff.gz
  to pool/main/s/snort/snort_2.3.3-8.diff.gz
snort_2.3.3-8.dsc
  to pool/main/s/snort/snort_2.3.3-8.dsc
snort_2.3.3-8_i386.deb
  to pool/main/s/snort/snort_2.3.3-8_i386.deb


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to