Integer overflow in the TCP stream reassembly module (stream4) for Snort 2.0 and earlier allows remote attackers to execute arbitrary code via large sequence numbers in packets, which enable a heap-based buffer overflow.
| Software | From | Fixed in |
|---|---|---|
| sourcefire / snort | 1.8.6 | 1.8.6.x |
| sourcefire / snort | 1.9.1 | 1.9.1.x |
| sourcefire / snort | 1.8.5 | 1.8.5.x |
| sourcefire / snort | 1.9 | 1.9.x |
| sourcefire / snort | 1.8.3 | 1.8.3.x |
| sourcefire / snort | 1.8.2 | 1.8.2.x |
| sourcefire / snort | 1.8 | 1.8.x |
| sourcefire / snort | 1.8.4 | 1.8.4.x |
| sourcefire / snort | 1.8.7 | 1.8.7.x |
| smoothwall / smoothwall | 2.0_beta_4 | 2.0_beta_4.x |
| sourcefire / snort | 1.8.1 | 1.8.1.x |