ALT-BU-2020-4203-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2018-00358
Уязвимость драйвера обработки TCP-пакетов систем обнаружения вторжений Snort и Suricata IDS, позволяющая нарушителю обойти функцию обнаружения сетевых атак
Modified: 2024-11-21
CVE-2018-14568
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
- https://github.com/kirillwow/ids_bypass
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
- https://redmine.openinfosecfoundation.org/issues/2501
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://github.com/kirillwow/ids_bypass
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://redmine.openinfosecfoundation.org/issues/2501
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
Modified: 2024-11-21
CVE-2018-18956
The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
Modified: 2024-11-21
CVE-2018-6794
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- https://redmine.openinfosecfoundation.org/issues/2427
- https://redmine.openinfosecfoundation.org/issues/2427
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- 44247
- 44247
Modified: 2024-11-21
CVE-2019-10050
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.
Modified: 2024-11-21
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://redmine.openinfosecfoundation.org/issues/2736
- https://redmine.openinfosecfoundation.org/issues/2736
Modified: 2024-11-21
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://redmine.openinfosecfoundation.org/issues/2770
- https://redmine.openinfosecfoundation.org/issues/2770