Buffer Overflow Vulnerability in Suricata Prior to 7.0.5 and 6.0.19
CVE-2024-32664

7.3HIGH

Key Information:

Vendor

Oisf

Status
Vendor
CVE Published:
7 May 2024

Badges

đź“° News Worthy

What is CVE-2024-32664?

The vulnerability present in Suricata, a prominent open-source network Intrusion Detection System (IDS), allows an attacker to exploit a limited buffer overflow through specially crafted traffic or datasets. This issue impacts versions prior to 7.0.5 and 6.0.19, requiring users to update to the patched versions to mitigate risks. As a temporary workaround, users are advised to avoid using rules containing the base64_decode keyword with the bytes option set to values like 1, 2, or 5. For those using version 7.0.x, disabling the app-layer.protocols.smtp.mime.body-md5 setting is recommended to reduce vulnerability exposure. Prompt updates and vulnerability management practices are essential for maintaining robust network security.

Affected Version(s)

suricata >= 6.0.0, <= 6.0.18 <= 6.0.0, 6.0.18

suricata >= 7.0.0, <= 7.0.4 <= 7.0.0, 7.0.4

News Articles

Kaspersky found multiple memory corruptions in Suricata and FreeRDP

While pentesting KasperskyOS-based Thin Client and IoT Secure Gateway, we found several vulnerabilities in the Suricata and FreeRDP open-source projects. We shared details on these vulnerabilities with the community along with our fuzzer.

References

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • đź“°

    First article discovered

  • Vulnerability published

  • Vulnerability Reserved

.