New Snort Patch Released

New Snort Patch Released A new security vulnerability has been reported for Snort, versions 1.8 to 1.9.0. Snort is used as a tool for real-time packet analysis, often as a means to identify probes and attacks. A buffer overflow could cause Snort to execute code embedded within inspected network packets. The unauthorized code could operate under root privileges. The solution to this problem is to install the latest release of Snort (version 1.9.1) or disable the rpc decode preprocessor. The latest version of Snot can be downloaded at www.snort.org. Please see the CERT alert for additional information. http://www.kb.cert.org/vuls/id/916785