7.5
CVSSv2

CVE-2005-3252

Published: 18/10/2005 Updated: 08/03/2011
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 775
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the Back Orifice (BO) preprocessor for Snort prior to 2.4.3 allows remote malicious users to execute arbitrary code via a crafted UDP packet.

Vulnerable Product Search on Vulmon Subscribe to Product

sourcefire snort 2.4.1

sourcefire snort 2.4.2

sourcefire snort 2.4.0

Exploits

#!/usr/bin/ruby -w # # # Version 01 (Public) # # snort 240 - 242 Back Orifice Pre-Preprocessor Remote Exploit # # by xwings at mysec dot org # URL : wwwmysecorg , somebody need to update the page # # Saying Hi to # # All the 1337 c0d3r @ pulltheplugorg # Gurus from #rubylang @ freenodenet # Skywizard @ somewhere right n ...
## # $Id: snortboprerb 9669 2010-07-03 03:13:45Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metas ...
/* * snort 240 - 242 Back Orifice Pre-Preprocessor Remote Exploit * * by Russell Sanford (xort@tty64org) * -> wwwcode-junkiesnet <- * * Date: Nov 11, 2005 * * Discription: A buffer overflow exist in the snort pre-preprocessor * designed to detect encrypted Back Orifice ping packets * o ...
/* * THCsnortbo 03 - Snort BackOrifice PING exploit * by rd@thcorg * THC PUBLIC SOURCE MATERIALS * * Bug was found by Internet Security Systems * xforceissnet/xforce/alerts/id/207 * * v03 - removed/cleaned up info for public release * v02 - details added, minor changes * v01 - first release * * Greetz to all guests at T ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Ms ...