Mailing the story:

Mandrake alert: Updated snort packages fix buffer overflow vulnerability

A buffer overflow was discovered in the snort RPC normalization routines by ISS-XForce which can cause snort to execute arbitrary code embedded within sniffed network packets. The rpc_decode preprocessor is enabled by default. The snort developers have released version 1.9.1 to correct this behaviour; snort versions from 1.8 up to 1.9.0 are vulnerable.
What is your name?

What is your E-Mail address?

What is the email address of the recipient?

Add a special note from yourself?