Suricata Vulnerability: CPU and Memory Overload Due to Misconfigured Parser
CVE-2024-23836
7.5HIGH
What is CVE-2024-23836?
Suricata, a well-known network Intrusion Detection and Prevention System, is susceptible to a vulnerability that allows attackers to exploit crafted traffic. This flaw results in excessive CPU and memory usage, potentially leading to severe system slowdowns and denial of service. Users of Suricata versions older than 6.0.16 and 7.0.3 are at risk. To mitigate this issue, it is recommended to disable the affected protocol app-layer parser in the configuration file and to reduce the stream.reassembly.depth
setting. The vulnerability is resolved in the specified patched versions.
Affected Version(s)
suricata < 6.0.16 < 6.0.16
suricata >= 7.0.0, < 7.0.3 < 7.0.0, 7.0.3
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved