Untrusted search path vulnerability in Snort 2.9.7.0-WIN32 allows remote attackers to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse tcapi.dll that is located in the same folder on a remote file share as a pcap file that is being processed.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/SNORT-DLL-HIJACK.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/138915/Snort-2.9.7.0-WIN32-DLL-Hijacking.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539579/100/0/threaded | |
http://www.securityfocus.com/bid/93269 | Exploit Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036936 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2017-01-23T21:00:00
Updated: 2018-10-09T18:57:01
Reserved: 2016-01-04T00:00:00
Link: CVE-2016-1417
JSON object: View
NVD Information
Status : Modified
Published: 2017-01-23T21:59:01.003
Modified: 2018-10-09T19:59:07.083
Link: CVE-2016-1417
JSON object: View
Redhat Information
No data.
CWE