Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
Security researchers posted code on Tuesday capable of compromising computers running the most recent versions of the Snort open-source intrusion detection system.
The exploit will work in most cases, according to The Hacker's Choice security group, which published the code.
The published exploit comes exactly one week after Internet Security Systems and the US-CERT announced the existence of a flaw in how the Snort preprocessor for BackOrifice parses hostile data.