Bugtraq mailing list archives
Re: Snort 1.6 and nmap 2.54beta1
From: thegnome () NMRC ORG (Simple Nomad)
Date: Wed, 14 Jun 2000 17:25:47 -0500
Confirmed. Add this after line 203 in log.c: else sprintf(log_file, "%s/%s:%d-%d", log_path, "UNKNOWN", p->sp, p->dp); until Martin can officially patch it. - Simple Nomad - No rest for the Wicca'd - - thegnome () nmrc org - www.nmrc.org - - thegnome () razor bindview com - razor.bindview.com - On Fri, 12 May 2000, Galileo wrote:
I don't know if this has been reported before but here it goes. snort 1.6 crashes when it's "hit" by a nmap protocol scan ( nmap -sO); It failes to write some packets to a file and ends whit a fopen () error. I woud appriciate if someone can reproduce this. Sorry for my bad English.
Current thread:
- Sendmail local root exploit on linux 2.2.x Florian Heinz (Jun 08)
- Snort 1.6 and nmap 2.54beta1 Galileo (May 12)
- Re: Snort 1.6 and nmap 2.54beta1 Simple Nomad (Jun 14)
- Security Advisory: REMOTE ROOT VULNERABILITY IN GSSFTP DAEMON Tom Yu (Jun 14)
- Security Advisory: local ROOT exploit in BRU Technical Support (Jun 14)
- Re: Snort 1.6 and nmap 2.54beta1 Martin Roesch (Jun 14)
- Re: Sendmail local root exploit on linux 2.2.x Mark K. Pettit (Jun 08)
- Reporting Security Issues to Microsoft Microsoft Security Response Center (Jun 08)
- Re: Sendmail local root exploit on linux 2.2.x Christophe GRENIER (Jun 08)
- arprelay: a tool to edit TCP connections in a LAN Felix von Leitner (Jun 09)
- Re: Sendmail local root exploit on linux 2.2.x Alan Iwi (Jun 12)
- Splitvt exploit syzop (Jun 14)
- Re: Splitvt exploit Joey Hess (Jun 14)
(Thread continues...)
- Snort 1.6 and nmap 2.54beta1 Galileo (May 12)