CVE-2019-1010279Improper Verification of Cryptographic Signature in Suricata

Severity
7.5HIGHNVD
EPSS
0.2%
top 58.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 18
Latest updateMay 24

Description

Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5open_information_security_foundation/suricataprior to version 4.1.3 [fixed: 4.1.3]
NVDoisf/suricata< 4.1.3
Debianoisf/suricata< 1:4.1.3-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j935-gp2p-2q7f: Open Information Security Foundation Suricata prior to version 42022-05-24
CVEList
CVE-2019-1010279: Open Information Security Foundation Suricata prior to version 42019-07-18
OSV
CVE-2019-1010279: Open Information Security Foundation Suricata prior to version 42019-07-18

📋Vendor Advisories

1
Debian
CVE-2019-1010279: suricata - Open Information Security Foundation Suricata prior to version 4.1.3 is affected...2019

💬Community

1
Bugzilla
CVE-2019-1010279 suricata: TCP/HTTP detection bypass in detect.c leads to denial of service2019-08-01
CVE-2019-1010279 — Oisf Suricata vulnerability | cvebase