CVE-2024-47188Use of Insufficiently Random Values in Suricata

Severity
7.5HIGHNVD
OSV5.5
EPSS
0.1%
top 69.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 16

Description

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for "thash" leads to byte-range tracking having predictable hash table behavior. This can lead to an attacker forcing lots of data into a single hash bucket, leading to severe performance degradation. This issue has been addressed in 7.0.7.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5oisf/suricata< 7.0.7
NVDoisf/suricata< 7.0.7
Debianoisf/suricata< 1:7.0.7-1+1
Ubuntulinux/linux_kernel< 5.4.0-196.216+1

🔴Vulnerability Details

6
CVEList
Suricata http/byte-ranges: missing hashtable random seed leads to potential DoS2024-10-16
OSV
CVE-2024-47188: Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine2024-10-16
OSV
linux-raspi-5.4 vulnerabilities2024-10-10
OSV
linux-raspi vulnerabilities2024-10-01
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2024-09-26

📋Vendor Advisories

1
Debian
CVE-2024-47188: suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System an...2024
CVE-2024-47188 — Use of Insufficiently Random Values | cvebase