Snort before 2.8.5.1, when the -v option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted IPv6 packet that uses the (1) TCP or (2) ICMP protocol.Referenceshttp://www.osvdb.org/59159http://www.securityfocus.com/bid/36795http://securitytracker.com/id?1023076http://dl.snort.org/snort-current/release_notes_2851.txthttp://secunia.com/advisories/37135http://marc.info/?l=oss-security&m=125649553414700&w=2http://vrt-sourcefire.blogspot.com/2009/10/snort-2851-release.htmlhttp://www.vupen.com/english/advisories/2009/3014https://exchange.xforce.ibmcloud.com/vulnerabilities/53912http://www.openwall.com/lists/oss-security/2009/10/25/5http://seclists.org/fulldisclosure/2009/Oct/299https://bugzilla.redhat.com/show_bug.cgi?id=530863