Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 918617 (CVE-2023-20267) - net-analyzer/snort: IP geolocation rule circumvention
Summary: net-analyzer/snort: IP geolocation rule circumvention
Status: CONFIRMED
Alias: CVE-2023-20267
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://sec.cloudapps.cisco.com/secur...
Whiteboard: ~4 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2023-11-26 19:45 UTC by John Helmert III
Modified: 2023-11-26 19:45 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-11-26 19:45:27 UTC
CVE-2023-20267:

A vulnerability in the IP geolocation rules of Snort 3 could allow an unauthenticated, remote attacker to potentially bypass IP address restrictions. This vulnerability exists because the configuration for IP geolocation rules is not parsed properly. An attacker could exploit this vulnerability by spoofing an IP address until they bypass the restriction. A successful exploit could allow the attacker to bypass location-based IP address restrictions.

Is <snort-3 affected?