cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2017-6657,https://securityvulnerability.io/vulnerability/CVE-2017-6657,,"Cisco Sourcefire Snort 3.0 before build 233 mishandles Ether Type Validation. Since valid ether type and IP protocol numbers do not overlap, Snort++ stores all protocol decoders in a single array. That makes it possible to craft packets that have IP protocol numbers in the ether type field which will confuse the Snort++ decoder. For example, an eth:llc:snap:icmp6 packet will cause a crash because there is no ip6 header with which to calculate the icmp6 checksum. Affected decoders include gre, llc, trans_bridge, ciscometadata, linux_sll, and token_ring. The fix adds a check in the packet manager to validate the ether type before indexing the decoder array. An out of range ether type will raise 116:473.",Cisco,Snort 3.0 All Versions Prior To Build 233.,7.5,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2017-05-16T17:00:00.000Z,0 CVE-2017-6658,https://securityvulnerability.io/vulnerability/CVE-2017-6658,,Cisco Sourcefire Snort 3.0 before build 233 has a Buffer Overread related to use of a decoder array. The size was off by one making it possible to read past the end of the array with an ether type of 0xFFFF. Increasing the array size solves this problem.,Cisco,Snort 3.0 All Versions Prior To Build 233.,7.5,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2017-05-16T17:00:00.000Z,0