From: Alfred Huger <ah@securityfocus.com> To: <incidents@securityfocus.com> Subject: New Snort Signatures/ TESO Telnetd Overflow Date: Tue, 24 Jul 2001 22:30:00 -0600 (MDT) Cc: <aris-users@securityfocus.com>, <aris-report@securityfocus.com> Heya all, For those of you Snort users out there (a rather large number, I know) Marty Roesch and Brian Caswell have made signatures available for BID 3064, Multiple Vendor Telnetd Buffer Overflow Vulnerability. This vulnerability looks to be making the rounds as we speak. Since no other IDS (that I know of) detects this vulnerability an update of your ruleset is most likely in order: http://snort.sourceforge.net/snortrules.tar.gz or simply http://www.snort.org Cheers, -al VP Engineering SecurityFocus.com "Vae Victis" ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com