Oisf

Suricata

45 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 26.02.2024 16:27:57
  • Zuletzt bearbeitet 18.12.2024 18:07:03

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.3, excessive memory use during pgsql parsing could lead to OOM-related crashes. This vulnerability is patched...

  • EPSS 0.55%
  • Veröffentlicht 19.06.2023 04:15:11
  • Zuletzt bearbeitet 11.12.2024 17:15:13

In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.

  • EPSS 0.58%
  • Veröffentlicht 19.06.2023 04:15:11
  • Zuletzt bearbeitet 21.11.2024 08:08:49

In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 06.04.2023 18:15:08
  • Zuletzt bearbeitet 12.02.2025 16:15:31

Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php.

Exploit
  • EPSS 0.55%
  • Veröffentlicht 16.12.2021 05:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:57

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to injec...

  • EPSS 0.14%
  • Veröffentlicht 19.11.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:28

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.

  • EPSS 1.08%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 21.11.2024 06:11:46

Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."

  • EPSS 0.25%
  • Veröffentlicht 06.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:23

An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP T...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 06.01.2020 18:15:23
  • Zuletzt bearbeitet 21.11.2024 04:33:34

An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK pac...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 18.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:07

Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The com...