Show filters
58 Total Results
Displaying 21-30 of 58
Sort by:
Attacker Value
Unknown
CVE-2024-23836
Disclosure Date: February 26, 2024 (last updated December 20, 2024)
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing the traffic than needed, which can lead to extreme slow downs and denial of service. This vulnerability is patched in 6.0.16 or 7.0.3. Workarounds include disabling the affected protocol app-layer parser in the yaml and reducing the `stream.reassembly.depth` value helps reduce the severity of the issue.
0
Attacker Value
Unknown
CVE-2024-23835
Disclosure Date: February 26, 2024 (last updated December 19, 2024)
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched in 7.0.3. As workaround, users can disable the pgsql app layer parser.
0
Attacker Value
Unknown
CVE-2023-35853
Disclosure Date: June 19, 2023 (last updated October 08, 2023)
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
0
Attacker Value
Unknown
CVE-2023-35852
Disclosure Date: June 19, 2023 (last updated October 08, 2023)
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
0
Attacker Value
Unknown
CVE-2020-19678
Disclosure Date: April 06, 2023 (last updated October 08, 2023)
Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php.
0
Attacker Value
Unknown
CVE-2021-45098
Disclosure Date: December 16, 2021 (last updated October 07, 2023)
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
0
Attacker Value
Unknown
CVE-2021-37592
Disclosure Date: November 19, 2021 (last updated February 23, 2025)
Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
0
Attacker Value
Unknown
CVE-2021-35063
Disclosure Date: July 22, 2021 (last updated November 08, 2023)
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
0
Attacker Value
Unknown
CVE-2019-17420
Disclosure Date: October 10, 2019 (last updated November 27, 2024)
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
0
Attacker Value
Unknown
CVE-2019-16411
Disclosure Date: September 24, 2019 (last updated November 27, 2024)
An issue was discovered in Suricata 4.1.4. By sending multiple IPv4 packets that have invalid IPv4Options, the function IPV4OptValidateTimestamp in decode-ipv4.c tries to access a memory region that is not allocated. There is a check for o->len < 5 (corresponding to 2 bytes of header and 3 bytes of data). Then, "flag = *(o->data + 3)" places one beyond the 3 bytes, because the code should have been "flag = *(o->data + 1)" instead.
0