Lucene search

K
Suricata-idsSuricata

7 matches found

CVE
CVE
added 2019/08/28 9:15 p.m.93 views

CVE-2019-10056

An issue was discovered in Suricata 4.1.3. The code mishandles the case of sending a network packet with the right type, such that the function DecodeEthernet in decode-ethernet.c is executed a second time. At this point, the algorithm cuts the first part of the packet and doesn't determine the cur...

7.5CVSS7.5AI score0.00392EPSS
CVE
CVE
added 2019/08/28 9:15 p.m.89 views

CVE-2019-10055

An issue was discovered in Suricata 4.1.3. The function ftp_pasv_response lacks a check for the length of part1 and part2, leading to a crash within the ftp/mod.rs file.

7.8CVSS7.4AI score0.00307EPSS
CVE
CVE
added 2019/08/28 9:15 p.m.88 views

CVE-2019-10054

An issue was discovered in Suricata 4.1.3. The function process_reply_record_v3 lacks a check for the length of reply.data. It causes an invalid memory access and the program crashes within the nfs/nfs3.rs file.

7.5CVSS7.5AI score0.00392EPSS
CVE
CVE
added 2019/08/28 8:15 p.m.66 views

CVE-2019-10052

An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.

7.5CVSS7.4AI score0.00469EPSS
CVE
CVE
added 2019/08/28 8:15 p.m.65 views

CVE-2019-10051

An issue was discovered in Suricata 4.1.3. If the function filetracker_newchunk encounters an unsafe "Some(sfcm) => { ft.new_chunk }" item, then the program enters an smb/files.rs error condition and crashes.

7.5CVSS7.5AI score0.00469EPSS
CVE
CVE
added 2018/11/05 9:29 p.m.38 views

CVE-2018-18956

The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.

7.5CVSS7.2AI score0.01211EPSS
CVE
CVE
added 2018/07/23 8:29 p.m.33 views

CVE-2018-14568

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

7.5CVSS7.5AI score0.00281EPSS