Severity
7.5HIGHNVD
EPSS
0.5%
top 34.04%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 28
Latest updateMay 24

Description

An issue was discovered in Suricata 4.1.3. The code mishandles the case of sending a network packet with the right type, such that the function DecodeEthernet in decode-ethernet.c is executed a second time. At this point, the algorithm cuts the first part of the packet and doesn't determine the current length. Specifically, if the packet is exactly 28 long, in the first iteration it subtracts 14 bytes. Then, it is working with a packet length of 14. At this point, the case distinction says it is

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Debianoisf/suricata< 1:4.1.4-1+3
NVDsuricata-ids/suricata4.1.3, 4.1.4+1

🔴Vulnerability Details

3
GHSA
GHSA-fh58-6cxc-xhx5: An issue was discovered in Suricata 42022-05-24
CVEList
CVE-2019-10056: An issue was discovered in Suricata 42019-08-28
OSV
CVE-2019-10056: An issue was discovered in Suricata 42019-08-28

📋Vendor Advisories

1
Debian
CVE-2019-10056: suricata - An issue was discovered in Suricata 4.1.3. The code mishandles the case of sendi...2019

💬Community

1
Bugzilla
CVE-2019-10056 suricata: denial of service in function DecodeEthernet in decode-ethernet.c2019-09-05
CVE-2019-10056 — Out-of-bounds Write in Suricata | cvebase