ALT-BU-2024-8276-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2022-01686
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-06804
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостаточной проверкой хэш-функции, позволяющая нарушителю реализовать атаку TCP Reset
BDU:2023-06805
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю обойти ограничения безопасности и реализовать атаку TCP Reset
Modified: 2024-11-21
CVE-2021-35063
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990835
- https://bugzilla.redhat.com/show_bug.cgi?id=1980453
- https://bugzilla.redhat.com/show_bug.cgi?id=1980453
- https://forum.suricata.io/t/suricata-6-0-3-and-5-0-7-released/1489
- https://forum.suricata.io/t/suricata-6-0-3-and-5-0-7-released/1489
- https://github.com/OISF/suricata/releases
- https://github.com/OISF/suricata/releases
- FEDORA-2021-c7fd9e9126
- FEDORA-2021-c7fd9e9126
- FEDORA-2021-ad5883c848
- FEDORA-2021-ad5883c848
- https://security-tracker.debian.org/tracker/CVE-2021-35063
- https://security-tracker.debian.org/tracker/CVE-2021-35063
Modified: 2024-11-21
CVE-2021-37592
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
- https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
- https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
- https://github.com/OISF/suricata/releases
- https://github.com/OISF/suricata/releases
- https://redmine.openinfosecfoundation.org/issues/4569
- https://redmine.openinfosecfoundation.org/issues/4569
Modified: 2024-11-21
CVE-2021-45098
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
- https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
- https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
- https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df
- https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df
- https://github.com/OISF/suricata/releases
- https://github.com/OISF/suricata/releases
- https://redmine.openinfosecfoundation.org/issues/4710
- https://redmine.openinfosecfoundation.org/issues/4710