ALT-PU-2024-9414-1
Closed vulnerabilities
BDU:2022-02373
Уязвимость реализации проверки регулярных выражений (regex для Rust) веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-03122
Уязвимость библиотеки LibHTP, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-24713
regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to prevent untrusted regexes to take an arbitrary amount of time during parsing, and it's possible to craft regexes that bypass such mitigations. This makes it possible to perform denial of service attacks by sending specially crafted regexes to services accepting user-controlled, untrusted regexes. All versions of the regex crate before or equal to 1.5.4 are affected by this issue. The fix is include starting from regex 1.5.5. All users accepting user-controlled regexes are recommended to upgrade immediately to the latest version of the regex crate. Unfortunately there is no fixed set of problematic regexes, as there are practically infinite regexes that could be crafted to exploit this vulnerability. Because of this, it us not recommend to deny known problematic regexes.
- https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e
- https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e
- https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8
- https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8
- https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
- https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
- [debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
- [debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
- [debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
- [debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
- FEDORA-2022-8436ac4c39
- FEDORA-2022-8436ac4c39
- FEDORA-2022-d20d44ba98
- FEDORA-2022-d20d44ba98
- FEDORA-2022-ceb3e03c5e
- FEDORA-2022-ceb3e03c5e
- GLSA-202208-08
- GLSA-202208-08
- GLSA-202208-14
- GLSA-202208-14
- DSA-5113
- DSA-5113
- DSA-5118
- DSA-5118
Modified: 2024-11-21
CVE-2024-28870
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community. When parsing an overly long SSH banner, Suricata can use excessive CPU resources, as well as cause excessive logging volume in alert records. This issue has been patched in versions 6.0.17 and 7.0.4.
Modified: 2024-11-21
CVE-2024-28871
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Version 0.5.46 may parse malformed request traffic, leading to excessive CPU usage. Version 0.5.47 contains a patch for the issue. No known workarounds are available.
- https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed
- https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed
- https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d
- https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d
- https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg
- https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg
- https://redmine.openinfosecfoundation.org/issues/6757
- https://redmine.openinfosecfoundation.org/issues/6757
Modified: 2024-12-19
CVE-2024-32663
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing `app-layer.protocols.http2.max-table-size` value (default is 65536).
- https://github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64
- https://github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64
- https://github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fd
- https://github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fd
- https://github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019
- https://github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019
- https://github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5
- https://github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5
- https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r
- https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r
- https://redmine.openinfosecfoundation.org/issues/6892
- https://redmine.openinfosecfoundation.org/issues/6892
- https://redmine.openinfosecfoundation.org/issues/6900
- https://redmine.openinfosecfoundation.org/issues/6900
Modified: 2024-12-19
CVE-2024-32664
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, specially crafted traffic or datasets can cause a limited buffer overflow. This vulnerability is fixed in 7.0.5 and 6.0.19. Workarounds include not use rules with `base64_decode` keyword with `bytes` option with value 1, 2 or 5 and for 7.0.x, setting `app-layer.protocols.smtp.mime.body-md5` to false.
- https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379
- https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379
- https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4
- https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4
- https://github.com/OISF/suricata/security/advisories/GHSA-79vh-hpwq-3jh7
- https://github.com/OISF/suricata/security/advisories/GHSA-79vh-hpwq-3jh7
Modified: 2024-12-19
CVE-2024-32867
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, various problems in handling of fragmentation anomalies can lead to mis-detection of rules and policy. This vulnerability is fixed in 7.0.5 or 6.0.19.
- https://github.com/OISF/suricata/commit/1e110d0a71db46571040b937e17a4bc9f91d6de9
- https://github.com/OISF/suricata/commit/1e110d0a71db46571040b937e17a4bc9f91d6de9
- https://github.com/OISF/suricata/commit/2f39ba75f153ba9bdf8eedc2a839cc973dbaea66
- https://github.com/OISF/suricata/commit/2f39ba75f153ba9bdf8eedc2a839cc973dbaea66
- https://github.com/OISF/suricata/commit/414f97c6695c5a2e1d378a36a6f50d7288767634
- https://github.com/OISF/suricata/commit/414f97c6695c5a2e1d378a36a6f50d7288767634
- https://github.com/OISF/suricata/commit/bf3d420fb709ebe074019a99e3bd3a2364524a4b
- https://github.com/OISF/suricata/commit/bf3d420fb709ebe074019a99e3bd3a2364524a4b
- https://github.com/OISF/suricata/commit/d13bd2ae217a6d2ceb347f74d27cbfcd37b9bda9
- https://github.com/OISF/suricata/commit/d13bd2ae217a6d2ceb347f74d27cbfcd37b9bda9
- https://github.com/OISF/suricata/commit/e6267758ed5da27f804f0c1c07f9423bdf4d72b8
- https://github.com/OISF/suricata/commit/e6267758ed5da27f804f0c1c07f9423bdf4d72b8
- https://github.com/OISF/suricata/security/advisories/GHSA-xvrx-88mv-xcq5
- https://github.com/OISF/suricata/security/advisories/GHSA-xvrx-88mv-xcq5
- https://redmine.openinfosecfoundation.org/issues/6672
- https://redmine.openinfosecfoundation.org/issues/6672
- https://redmine.openinfosecfoundation.org/issues/6673
- https://redmine.openinfosecfoundation.org/issues/6673
- https://redmine.openinfosecfoundation.org/issues/6677
- https://redmine.openinfosecfoundation.org/issues/6677