First published: Tue Oct 07 2014(Updated: )
The SSHParseBanner function in SSH parser (app-layer-ssh.c) in Suricata before 2.0.4 allows remote attackers to bypass SSH rules, cause a denial of service (crash), or possibly have unspecified other impact via a crafted banner, which triggers a large memory allocation or an out-of-bounds write.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata | <=2.0.3-2 | |
Suricata | =2.0.1-1 | |
Suricata | =2.0.1-2 | |
Suricata | =2.0.2-1 | |
Suricata | =2.0.2-2 | |
Suricata | =2.0.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6603 has a moderate severity rating due to the potential for denial of service and remote attack risks.
To fix CVE-2014-6603, update Suricata to version 2.0.4 or later.
CVE-2014-6603 can lead to bypass of SSH rules, denial of service, and potential crashes.
Suricata versions prior to 2.0.4, including 2.0.1-2, 2.0.2-2, and 2.0.3-2, are affected by CVE-2014-6603.
CVE-2014-6603 specifically involves the SSHParseBanner function within the SSH parser of Suricata.