Show filters
43 Total Results
Displaying 31-40 of 43
Sort by:
Attacker Value
Unknown

CVE-2021-35063

Disclosure Date: July 22, 2021 (last updated November 08, 2023)
Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."
Attacker Value
Unknown

CVE-2019-17420

Disclosure Date: October 10, 2019 (last updated November 27, 2024)
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
Attacker Value
Unknown

CVE-2019-1010279

Disclosure Date: July 18, 2019 (last updated November 27, 2024)
Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.
0
Attacker Value
Unknown

CVE-2019-1010251

Disclosure Date: July 18, 2019 (last updated November 27, 2024)
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.
0
Attacker Value
Unknown

CVE-2019-18792

Disclosure Date: June 20, 2019 (last updated February 21, 2025)
An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK packet (containing the data) will be ignored by Suricata because it overlaps the FIN packet (the sequence and ack number are identical in the two packets). The client will ignore the fake FIN packet because the ACK flag is not set. Both linux and windows clients are ignoring the injected packet.
Attacker Value
Unknown

CVE-2019-18625

Disclosure Date: May 13, 2019 (last updated October 23, 2024)
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK packets because of the bad TCP Timestamp option. Both linux and windows client are ignoring the injected packets.
Attacker Value
Unknown

CVE-2019-10050

Disclosure Date: May 13, 2019 (last updated November 27, 2024)
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.
Attacker Value
Unknown

CVE-2018-10244

Disclosure Date: April 04, 2019 (last updated October 23, 2024)
Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check.
0
Attacker Value
Unknown

CVE-2018-10243

Disclosure Date: April 04, 2019 (last updated November 27, 2024)
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
0
Attacker Value
Unknown

CVE-2018-10242

Disclosure Date: April 04, 2019 (last updated October 23, 2024)
Suricata version 4.0.4 incorrectly handles the parsing of the SSH banner. A malformed SSH banner can cause the parsing code to read beyond the allocated data because SSHParseBanner in app-layer-ssh.c lacks a length check.
0