5
CVSSv2

CVE-2017-6657

Published: 16/05/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote malicious user to create a Denial of Service (DoS) condition. The vulnerabilities are due to lack of validation in the protocol decoders. An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the targeted device. A successful exploit could allow the malicious user to cause a DoS condition if the Snort process restarts and traffic inspection is bypassed or traffic is dropped. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco snort\\+\\+ -

Vendor Advisories

Two vulnerabilities in the protocol decoders of Snort++ (Snort 3) could allow an unauthenticated, remote attacker to create a Denial of Service (DoS) condition The vulnerabilities are due to lack of validation in the protocol decoders An attacker could exploit these vulnerabilities by crafting a malicious packet and sending it through the target ...