preprocessors/spp_frag3.c in Sourcefire Snort before 2.8.1 does not properly identify packet fragments that have dissimilar TTL values, which allows remote attackers to bypass detection rules by using a different TTL for each fragment.
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00198.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00167.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00156.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/42584
http://www.vupen.com/english/advisories/2008/1602
http://www.securityfocus.com/bid/29327
http://www.ipcop.org/index.php?name=News&file=article&sid=40
http://securitytracker.com/id?1020081
http://secunia.com/advisories/31204
http://secunia.com/advisories/30563
http://secunia.com/advisories/30348
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=701
http://cvs.snort.org/viewcvs.cgi/snort/ChangeLog?rev=1.534.2.11