Oisf

Suricata

52 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.23%
  • Veröffentlicht 06.04.2023 18:15:08
  • Zuletzt bearbeitet 12.02.2025 16:15:31

Directory Traversal vulnerability found in Pfsense v.2.1.3 and Pfsense Suricata v.1.4.6 pkg v.1.0.1 allows a remote attacker to obtain sensitive information via the file parameter to suricata/suricata_logs_browser.php.

Exploit
  • EPSS 0.65%
  • Veröffentlicht 16.12.2021 05:15:08
  • Zuletzt bearbeitet 03.11.2025 20:15:51

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to injec...

  • EPSS 0.14%
  • Veröffentlicht 19.11.2021 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:15:28

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.

  • EPSS 1.08%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 21.11.2024 06:11:46

Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."

  • EPSS 0.25%
  • Veröffentlicht 06.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:23

An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP T...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 06.01.2020 18:15:23
  • Zuletzt bearbeitet 21.11.2024 04:33:34

An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK pac...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 18.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:07

Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The com...

  • EPSS 0.4%
  • Veröffentlicht 18.07.2019 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:05

Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-lay...

  • EPSS 0.54%
  • Veröffentlicht 13.05.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:18:17

A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for ...

  • EPSS 0.67%
  • Veröffentlicht 04.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:05

Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check...