Palljon1123 writes "A stack-based buffer overflow in the Snort intrusion detection system could leave government and enterprise installations vulnerable to remote unauthenticated code execution attacks. The flaw, found by researchers at IBM's ISS X-Force, affects the Snort DCE/RPC preprocessor and could be used to execute code with the same privileges (usually root or SYSTEM) as the Snort binary. No user action is required."
Sourcefire has an update to fix the vulnerability in versions 2.6.1, 18.104.22.168, and 22.214.171.124; Heise Security spells out the workaround
for the 2.7.0 beta version.