Documents

The following setup guides have been contributed by members of the Snort Community for your use. Comments and questions on these documents should be submitted directly to the author by clicking on their names below.


Latest rule documents - Search
1-57536
This rule looks for a crafted HTTP request that can exploit a buffer overflow in the Novell eDirectory iMonitor webapp.
1-57534
Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
1-57533
Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
1-57532
The EdgeServiceImpl web service in Arcserve UDP before 5.0 Update 4 allows remote attackers to obtain sensitive credentials via a crafted SOAP request to the (1) getBackupPolicy or (2) getBackupPolicies method. Impact: CVSS base score 7.8 CVSS impact score 6.9 CVSS exploitability score 10.0 confidentialityImpact COMPLETE integrityImpact NONE availabilityImpact NONE Details: Ease of Attack:
1-52078
This event is generated when an attacker attempts to exploit a denial of service in ISC BIND. Impact: Attempted User Privilege Gain Details: This rule checks for attempts to exploit a denial of service in ISC BIND via crafted DNS responses with DNAME resource records. Ease of Attack:
1-51930
This rule attempts to identify payloads with deeply nested XML documents.