CVE-2021-1236

NameCVE-2021-1236
DescriptionMultiple Cisco products are affected by a vulnerability in the Snort application detection engine that could allow an unauthenticated, remote attacker to bypass the configured policies on an affected system. The vulnerability is due to a flaw in the detection algorithm. An attacker could exploit this vulnerability by sending crafted packets that would flow through an affected system. A successful exploit could allow the attacker to bypass the configured policies and deliver a malicious payload to the protected network.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3317-1, DSA-5354-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
snort (PTS)buster2.9.7.0-5vulnerable
buster (security)2.9.20-0+deb10u1fixed
bullseye2.9.15.1-5vulnerable
bullseye (security)2.9.20-0+deb11u1fixed
sid2.9.15.1-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
snortsourcebuster2.9.20-0+deb10u1DLA-3317-1
snortsourcebullseye2.9.20-0+deb11u1DSA-5354-1
snortsource(unstable)2.9.15.1-1

Notes

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-app-bypass-cSBYCATq

Search for package or bug name: Reporting problems