CVE-2025-64330Heap-based Buffer Overflow in Suricata

Severity
7.5HIGHNVD
EPSS
0.1%
top 79.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 26

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a single byte read heap overflow when logging the verdict in eve.alert and eve.drop records can lead to crashes. This requires the per packet alert queue to be filled with alerts and then followed by a pass rule. This issue has been patched in versions 7.0.13 and 8.0.2. To reduce the likelihood of this issue occurring, the aler

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5oisf/suricata< 8.0.2+1
NVDoisf/suricata8.0.08.0.2+1
Debianoisf/suricata< 1:7.0.10-1+deb13u2+1

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-64330: Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community2025-11-26
CVEList
Suricata is vulnerable to a heap buffer overflow on verdict2025-11-26

📋Vendor Advisories

2
Red Hat
Suricata: Suricata: Single byte read heap overflow leads to denial of service2025-11-26
Debian
CVE-2025-64330: suricata - Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform...2025
CVE-2025-64330 — Heap-based Buffer Overflow in Suricata | cvebase