[LWN Logo]
[LWN.net]
From:	 Alfred Huger <ah@securityfocus.com>
To:	 <incidents@securityfocus.com>
Subject: New Snort Signatures/ TESO Telnetd Overflow
Date:	 Tue, 24 Jul 2001 22:30:00 -0600 (MDT)
Cc:	 <aris-users@securityfocus.com>, <aris-report@securityfocus.com>


Heya all,

For those of you Snort users out there (a rather large number, I know)
Marty Roesch and Brian Caswell have made signatures available for BID
3064, Multiple Vendor Telnetd Buffer Overflow Vulnerability. This
vulnerability looks to be making the rounds as we speak.

Since no other IDS (that I know of) detects this vulnerability an update
of your ruleset is most likely in order:

http://snort.sourceforge.net/snortrules.tar.gz

or simply

http://www.snort.org


Cheers,
-al


VP Engineering
SecurityFocus.com
"Vae Victis"


----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management 
and tracking system please see: http://aris.securityfocus.com