CVE-2025-64331Stack-based Buffer Overflow in Suricata

Severity
7.5HIGHNVD
EPSS
0.1%
top 80.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 26

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printa

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5oisf/suricata< 8.0.2+1
NVDoisf/suricata8.0.08.0.2+1
Debianoisf/suricata< 1:7.0.10-1+deb13u2+1

🔴Vulnerability Details

2
OSV
CVE-2025-64331: Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community2025-11-26
CVEList
Suricata is vulnerable to a stack overflow on large file transfers with http-body-printable2025-11-26

📋Vendor Advisories

2
Red Hat
Suricata: Suricata: Stack overflow vulnerability in HTTP processing leads to denial of service2025-11-26
Debian
CVE-2025-64331: suricata - Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform...2025
CVE-2025-64331 — Stack-based Buffer Overflow | cvebase