ALT-BU-2021-3994-2
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2020-03905
Уязвимость набора библиотек и драйверов для быстрой обработки пакетов dpdk, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03944
Уязвимость функции vhost_user_set_log_base набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03962
Уязвимость модуля vhost-crypto набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-00722
Уязвимость модуля vhost-user набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00723
Уязвимость функции virtio_dev_rx_batch_packed набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10722
A vulnerability was found in DPDK versions 18.05 and above. A missing check for an integer overflow in vhost_user_set_log_base() could result in a smaller memory map than requested, possibly allowing memory corruption.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=267
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10722
- https://bugs.dpdk.org/show_bug.cgi?id=267
Modified: 2024-11-21
CVE-2020-10723
A memory corruption issue was found in DPDK versions 17.05 and above. This flaw is caused by an integer truncation on the index of a payload. Under certain circumstances, the index (a UInt) is copied and truncated into a uint16, which can lead to out of bound indexing and possible memory corruption.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=268
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10723
- https://bugs.dpdk.org/show_bug.cgi?id=268
Modified: 2024-11-21
CVE-2020-10724
A vulnerability was found in DPDK versions 18.11 and above. The vhost-crypto library code is missing validations for user-supplied values, potentially allowing an information leak through an out-of-bounds memory read.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=269
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724
- FEDORA-2020-04e3d34451
- USN-4362-1
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- USN-4362-1
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10724
- https://bugs.dpdk.org/show_bug.cgi?id=269
Modified: 2024-11-21
CVE-2020-10725
A flaw was found in DPDK version 19.11 and above that allows a malicious guest to cause a segmentation fault of the vhost-user backend application running on the host, which could result in a loss of connectivity for the other guests running on that host. This is caused by a missing validity check of the descriptor address in the function `virtio_dev_rx_batch_packed()`.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=270
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
- FEDORA-2020-04e3d34451
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10725
- https://bugs.dpdk.org/show_bug.cgi?id=270
Modified: 2024-11-21
CVE-2020-10726
A vulnerability was found in DPDK versions 19.11 and above. A malicious container that has direct access to the vhost-user socket can keep sending VHOST_USER_GET_INFLIGHT_FD messages, causing a resource leak (file descriptors and virtual memory), which may result in a denial of service.
- openSUSE-SU-2020:0693
- https://bugs.dpdk.org/show_bug.cgi?id=271
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726
- FEDORA-2020-04e3d34451
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- openSUSE-SU-2020:0693
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.openwall.com/lists/oss-security/2020/05/18/2
- FEDORA-2020-04e3d34451
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10726
- https://bugs.dpdk.org/show_bug.cgi?id=271
Modified: 2024-11-21
CVE-2020-14374
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A flawed bounds checking in the copy_data function leads to a buffer overflow allowing an attacker in a virtual machine to write arbitrary data to any address in the vhost_crypto application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879466
- https://bugzilla.redhat.com/show_bug.cgi?id=1879466
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14375
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. Virtio ring descriptors, and the data they describe are in a region of memory accessible by from both the virtual machine and the host. An attacker in a VM can change the contents of the memory after vhost_crypto has validated it. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879468
- https://bugzilla.redhat.com/show_bug.cgi?id=1879468
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14376
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A lack of bounds checking when copying iv_data from the VM guest memory into host memory can lead to a large buffer overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879470
- https://bugzilla.redhat.com/show_bug.cgi?id=1879470
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14377
A flaw was found in dpdk in versions before 18.11.10 and before 19.11.5. A complete lack of validation of attacker-controlled parameters can lead to a buffer over read. The results of the over read are then written back to the guest virtual machine memory. This vulnerability can be used by an attacker in a virtual machine to read significant amounts of host memory. The highest threat from this vulnerability is to data confidentiality and system availability.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879472
- https://bugzilla.redhat.com/show_bug.cgi?id=1879472
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2020-14378
An integer underflow in dpdk versions before 18.11.10 and before 19.11.5 in the `move_desc` function can lead to large amounts of CPU cycles being eaten up in a long running loop. An attacker could cause `move_desc` to get stuck in a 4,294,967,295-count iteration loop. Depending on how `vhost_crypto` is being used this could prevent other VMs or network tasks from being serviced by the busy DPDK lcore for an extended period.
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1593
- openSUSE-SU-2020:1599
- openSUSE-SU-2020:1599
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- [oss-security] 20210104 Re: [dpdk-dev] DPDK security advisory for multiple vhost crypto issues
- https://bugzilla.redhat.com/show_bug.cgi?id=1879473
- https://bugzilla.redhat.com/show_bug.cgi?id=1879473
- USN-4550-1
- USN-4550-1
- https://www.openwall.com/lists/oss-security/2020/09/28/3
- https://www.openwall.com/lists/oss-security/2020/09/28/3
Modified: 2024-11-21
CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update
Package openvswitch updated to version 2.14.2-alt0.p9 for branch c9f2 in task 273327.
Closed vulnerabilities
BDU:2021-01134
Уязвимость микропрограммного обеспечения коммутатора Open vSwitch, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01805
Уязвимость реализации протокола LLDP под Unix Lldpd, программного многоуровневого коммутатора Open vSwitch, связанная с ошибкой механизма контроля расходуемых ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01890
Уязвимость функции lldp_decode компонента daemon/protocols/lldp.c реализации протокола LLDP под Unix Lldpd, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-8011
Buffer overflow in the lldp_decode function in daemon/protocols/lldp.c in lldpd before 0.8.0 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via vectors involving large management addresses and TLV boundaries.
- http://www.openwall.com/lists/oss-security/2015/10/16/2
- http://www.openwall.com/lists/oss-security/2015/10/16/2
- http://www.openwall.com/lists/oss-security/2015/10/30/2
- http://www.openwall.com/lists/oss-security/2015/10/30/2
- https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
- https://github.com/vincentbernat/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2
- https://github.com/vincentbernat/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- FEDORA-2021-fba11d37ee
- FEDORA-2021-fba11d37ee
- https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07
- https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07
- DSA-4836
- DSA-4836
Modified: 2024-11-21
CVE-2020-27827
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1921438
- https://bugzilla.redhat.com/show_bug.cgi?id=1921438
- https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
- FEDORA-2023-c0c184a019
- FEDORA-2023-c0c184a019
- FEDORA-2023-88991d2713
- FEDORA-2023-88991d2713
- FEDORA-2023-3e4feeadec
- FEDORA-2023-3e4feeadec
- https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html
- GLSA-202311-16
- GLSA-202311-16
- https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07
- https://us-cert.cisa.gov/ics/advisories/icsa-21-194-07
Modified: 2024-11-21
CVE-2020-35498
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1908845
- https://bugzilla.redhat.com/show_bug.cgi?id=1908845
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- FEDORA-2021-fba11d37ee
- FEDORA-2021-fba11d37ee
- GLSA-202311-16
- GLSA-202311-16
- DSA-4852
- DSA-4852
- https://www.openwall.com/lists/oss-security/2021/02/10/4
- https://www.openwall.com/lists/oss-security/2021/02/10/4
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0928
libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
Modified: 2024-11-21
CVE-2018-10243
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
Modified: 2024-11-21
CVE-2019-17420
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
Closed vulnerabilities
BDU:2018-00358
Уязвимость драйвера обработки TCP-пакетов систем обнаружения вторжений Snort и Suricata IDS, позволяющая нарушителю обойти функцию обнаружения сетевых атак
Modified: 2024-11-21
CVE-2018-14568
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
- https://github.com/kirillwow/ids_bypass
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
- https://redmine.openinfosecfoundation.org/issues/2501
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://github.com/kirillwow/ids_bypass
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://redmine.openinfosecfoundation.org/issues/2501
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
Modified: 2024-11-21
CVE-2018-18956
The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-November/016316.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://lists.openinfosecfoundation.org/pipermail/oisf-users/2018-October/016227.html
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
- https://redmine.openinfosecfoundation.org/issues/2658#change-10374
Modified: 2024-11-21
CVE-2018-6794
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- https://github.com/OISF/suricata/pull/3202/commits/e1ef57c848bbe4e567d5d4b66d346a742e3f77a1
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- [debian-lts-announce] 20181204 [SECURITY] [DLA 1603-1] suricata security update
- https://redmine.openinfosecfoundation.org/issues/2427
- https://redmine.openinfosecfoundation.org/issues/2427
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- https://suricata-ids.org/2018/02/14/suricata-4-0-4-available/
- 44247
- 44247
Modified: 2024-11-21
CVE-2019-10050
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.
Modified: 2024-11-21
CVE-2019-1010251
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b
- https://redmine.openinfosecfoundation.org/issues/2736
- https://redmine.openinfosecfoundation.org/issues/2736
Modified: 2024-11-21
CVE-2019-1010279
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b
- https://redmine.openinfosecfoundation.org/issues/2770
- https://redmine.openinfosecfoundation.org/issues/2770