CVE-2025-59149Stack-based Buffer Overflow in Suricata

Severity
6.2MEDIUMNVD
EPSS
0.0%
top 94.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 1

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In version 8.0.0, rules using keyword ldap.responses.attribute_type (which is long) with transforms can lead to a stack buffer overflow during Suricata startup or during a rule reload. This issue is fixed in version 8.0.1. To workaround this issue, users can disable rules with ldap.responses.attribute_type and transforms.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.5 | Impact: 3.6

Affected Packages2 packages

CVEListV5oisf/suricata>= 8.0.0, < 8.0.1
NVDoisf/suricata8.0.0

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-59149: Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community2025-10-01
CVEList
Suricata: Stack buffer overflow in rule parser when processing long keywords with transforms2025-10-01

📋Vendor Advisories

1
Debian
CVE-2025-59149: suricata - Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform...2025
CVE-2025-59149 — Stack-based Buffer Overflow | cvebase