Oisf

Suricata

59 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.08%
  • Veröffentlicht 22.07.2021 18:15:23
  • Zuletzt bearbeitet 21.11.2024 06:11:46

Suricata before 5.0.7 and 6.x before 6.0.3 has a "critical evasion."

  • EPSS 0.25%
  • Veröffentlicht 06.01.2020 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:23

An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP T...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 06.01.2020 18:15:23
  • Zuletzt bearbeitet 21.11.2024 04:33:34

An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK pac...

Exploit
  • EPSS 0.19%
  • Veröffentlicht 18.07.2019 19:15:11
  • Zuletzt bearbeitet 21.11.2024 04:18:07

Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The com...

  • EPSS 0.23%
  • Veröffentlicht 18.07.2019 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:18:05

Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-lay...

  • EPSS 0.54%
  • Veröffentlicht 13.05.2019 17:29:02
  • Zuletzt bearbeitet 21.11.2024 04:18:17

A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for ...

  • EPSS 0.67%
  • Veröffentlicht 04.04.2019 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:05

Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check...

  • EPSS 0.41%
  • Veröffentlicht 04.04.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 03:41:05

Suricata version 4.0.4 incorrectly handles the parsing of the SSH banner. A malformed SSH banner can cause the parsing code to read beyond the allocated data because SSHParseBanner in app-layer-ssh.c lacks a length check.

  • EPSS 0.94%
  • Veröffentlicht 30.05.2014 14:55:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Suricata before 1.4.6 allows remote attackers to cause a denial of service (crash) via a malformed SSL record.