English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 150599 CVE descriptions
and 73533 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.891603
Category:Debian Local Security Checks
Title:Debian LTS Advisory ([SECURITY] [DLA 1603-1] suricata security update)
Summary:Several issues were found in suricata, an intrusion detection and;prevention tool.;;CVE-2017-7177;;Suricata has an IPv4 defragmentation evasion issue caused by lack;of a check for the IP protocol during fragment matching.;;CVE-2017-15377;;It was possible to trigger lots of redundant checks on the content;of crafted network traffic with a certain signature, because of;DetectEngineContentInspection in detect-engine-content-inspection.c.;The search engine doesn't stop when it should after no match is;found. Instead, it stops only upon reaching inspection-recursion-;limit (3000 by default).;;CVE-2018-6794;;Suricata is prone to an HTTP detection bypass vulnerability in;detect.c and stream-tcp.c. If a malicious server breaks a normal;TCP flow and sends data before the 3-way handshake is complete,;then the data sent by the malicious server will be accepted by web;clients such as a web browser or Linux CLI utilities, but ignored;by Suricata IDS signatures. This mostly affects IDS signatures for;the HTTP protocol and TCP stream content. Signatures for TCP packets;will inspect such network traffic as usual.;;TEMP-0856648-2BC2C9 (no CVE assigned yet);;Out of bounds read in app-layer-dns-common.c.;On a zero size A or AAAA record, 4 or 16 bytes would still be read.
Description:Summary:
Several issues were found in suricata, an intrusion detection and
prevention tool.

CVE-2017-7177

Suricata has an IPv4 defragmentation evasion issue caused by lack
of a check for the IP protocol during fragment matching.

CVE-2017-15377

It was possible to trigger lots of redundant checks on the content
of crafted network traffic with a certain signature, because of
DetectEngineContentInspection in detect-engine-content-inspection.c.
The search engine doesn't stop when it should after no match is
found. Instead, it stops only upon reaching inspection-recursion-
limit (3000 by default).

CVE-2018-6794

Suricata is prone to an HTTP detection bypass vulnerability in
detect.c and stream-tcp.c. If a malicious server breaks a normal
TCP flow and sends data before the 3-way handshake is complete,
then the data sent by the malicious server will be accepted by web
clients such as a web browser or Linux CLI utilities, but ignored
by Suricata IDS signatures. This mostly affects IDS signatures for
the HTTP protocol and TCP stream content. Signatures for TCP packets
will inspect such network traffic as usual.

TEMP-0856648-2BC2C9 (no CVE assigned yet)

Out of bounds read in app-layer-dns-common.c.
On a zero size A or AAAA record, 4 or 16 bytes would still be read.

Affected Software/OS:
suricata on Debian Linux

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
2.0.7-2+deb8u3.

We recommend that you upgrade your suricata packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-7177
BugTraq ID: 97047
http://www.securityfocus.com/bid/97047
https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2018-6794
https://www.exploit-db.com/exploits/44247/
CopyrightCopyright (c) 2018 Greenbone Networks GmbH http://greenbone.net

This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.