Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46460
HistoryApr 16, 2024 - 3:00 p.m.

Resource Consumption And Excessive Logging

2024-04-1615:00:02
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
8
suricata
resource consumption
excessive logging
input validation
cpu resources
alert records
ssh banners

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Suricata is vulnerable to Resource Consumption and Excessive Logging. The vulnerability is due to insufficient input validation, causing Suricata to consume excessive CPU resources and generate excessive logging volume in alert records when processing SSH banners that exceed a certain length.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%