Bug 1735583 (CVE-2019-1010279) - CVE-2019-1010279 suricata: TCP/HTTP detection bypass in detect.c leads to denial of service
Summary: CVE-2019-1010279 suricata: TCP/HTTP detection bypass in detect.c leads to den...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2019-1010279
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-08-01 06:25 UTC by Dhananjay Arunesh
Modified: 2019-10-25 02:37 UTC (History)
4 users (show)

Fixed In Version: suricata 4.1.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-10-25 02:37:41 UTC
Embargoed:


Attachments (Terms of Use)

Description Dhananjay Arunesh 2019-08-01 06:25:37 UTC
A vulnerability was found in Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c. The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session.

Reference:
https://redmine.openinfosecfoundation.org/issues/2770
https://github.com/OISF/suricata/pull/3625

Upstream commit:
https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b


Note You need to log in before you can comment on or make changes to this bug.