Vulnerabilities (CVE)

Filtered by vendor Suricata-ids Subscribe
Filtered by product Suricata
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-10056 1 Suricata-ids 1 Suricata 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Suricata 4.1.3. The code mishandles the case of sending a network packet with the right type, such that the function DecodeEthernet in decode-ethernet.c is executed a second time. At this point, the algorithm cuts the first part of the packet and doesn't determine the current length. Specifically, if the packet is exactly 28 long, in the first iteration it subtracts 14 bytes. Then, it is working with a packet length of 14. At this point, the case distinction says it is a valid packet. After that it casts the packet, but this packet has no type, and the program crashes at the type case distinction.
CVE-2019-10055 1 Suricata-ids 1 Suricata 2021-07-21 7.8 HIGH 7.5 HIGH
An issue was discovered in Suricata 4.1.3. The function ftp_pasv_response lacks a check for the length of part1 and part2, leading to a crash within the ftp/mod.rs file.
CVE-2019-10054 1 Suricata-ids 1 Suricata 2021-07-21 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Suricata 4.1.3. The function process_reply_record_v3 lacks a check for the length of reply.data. It causes an invalid memory access and the program crashes within the nfs/nfs3.rs file.
CVE-2019-18625 3 Linux, Microsoft, Suricata-ids 3 Linux Kernel, Windows, Suricata 2020-08-24 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK packets because of the bad TCP Timestamp option. Both linux and windows client are ignoring the injected packets.
CVE-2018-18956 1 Suricata-ids 1 Suricata 2020-08-24 5.0 MEDIUM 7.5 HIGH
The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.
CVE-2018-14568 1 Suricata-ids 1 Suricata 2019-10-03 5.0 MEDIUM 7.5 HIGH
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
CVE-2019-10051 1 Suricata-ids 1 Suricata 2019-09-05 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Suricata 4.1.3. If the function filetracker_newchunk encounters an unsafe "Some(sfcm) => { ft.new_chunk }" item, then the program enters an smb/files.rs error condition and crashes.
CVE-2019-10052 1 Suricata-ids 1 Suricata 2019-09-04 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.
CVE-2018-10242 2 Debian, Suricata-ids 2 Debian Linux, Suricata 2019-05-06 5.0 MEDIUM 7.5 HIGH
Suricata version 4.0.4 incorrectly handles the parsing of the SSH banner. A malformed SSH banner can cause the parsing code to read beyond the allocated data because SSHParseBanner in app-layer-ssh.c lacks a length check.