CVE-2025-64344Stack-based Buffer Overflow in Suricata

Severity
7.5HIGHNVD
EPSS
0.1%
top 80.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 26

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5oisf/suricata< 8.0.2+1
NVDoisf/suricata8.0.08.0.2+1
Debianoisf/suricata< 1:7.0.10-1+deb13u2+1

Patches

🔴Vulnerability Details

2
OSV
CVE-2025-64344: Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community2025-11-26
CVEList
Suricata is vulnerable to a stack overflow from unbounded stack allocation in LuaPushStringBuffer2025-11-26

📋Vendor Advisories

2
Red Hat
Suricata: Suricata: Stack overflow in Lua scripts due to large buffers2025-11-26
Debian
CVE-2025-64344: suricata - Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Inform...2025
CVE-2025-64344 — Stack-based Buffer Overflow | cvebase