Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:cisco:snort\\+\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BF1C707-351E-4432-A14F-C5A73D528290", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Cisco Sourcefire Snort 3.0 before build 233 mishandles Ether Type Validation. Since valid ether type and IP protocol numbers do not overlap, Snort++ stores all protocol decoders in a single array. That makes it possible to craft packets that have IP protocol numbers in the ether type field which will confuse the Snort++ decoder. For example, an eth:llc:snap:icmp6 packet will cause a crash because there is no ip6 header with which to calculate the icmp6 checksum. Affected decoders include gre, llc, trans_bridge, ciscometadata, linux_sll, and token_ring. The fix adds a check in the packet manager to validate the ether type before indexing the decoder array. An out of range ether type will raise 116:473."}, {"lang": "es", "value": "Sourcefire Snort de Cisco versi\u00f3n 3.0 anterior a build 233, maneja inapropiadamente la comprobaci\u00f3n de Ether Type. A partir de un tipo ether v\u00e1lido y n\u00fameros de protocolo IP no superpuestos, Snort++ almacena todos los decodificadores de protocolo en una sola matriz. Eso hace posible dise\u00f1ar paquetes que tengan n\u00fameros de protocolo IP en el campo ether type que confundir\u00e1 al decodificador Snort++. Por ejemplo, un paquete eth:llc:snap:icmp6 causar\u00e1 un bloqueo porque no existe encabezado ip6 con que calcular la suma de comprobaci\u00f3n icmp6. Los decodificadores afectados incluyen gre, llc, trans_bridge, ciscometadata, linux_sll y token_ring. La correcci\u00f3n agrega una verificaci\u00f3n en el administrador de paquetes para comprobar el tipo ether antes de indexar la matriz de decodificador. Un tipo ether fuera de rango elevar\u00e1 a 116:473."}], "id": "CVE-2017-6657", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-05-16T17:29:00.403", "references": [{"source": "psirt@cisco.com", "tags": ["Third Party Advisory"], "url": "http://blog.snort.org/2017/05/snort-vulnerabilities-found.html"}, {"source": "psirt@cisco.com", "url": "http://www.securitytracker.com/id/1038483"}, {"source": "nvd@nist.gov", "tags": ["Vendor Advisory"], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170515-snort"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "http://blog.snort.org/2017/05/snort-vulnerabilities-found.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038483"}], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}