First published: Wed Apr 18 2018(Updated: )
OISF suricata-update version 1.0.0a1 contains an Insecure Deserialization vulnerability in the insecure yaml.load-Function as used in the following files: config.py:136, config.py:142, sources.py:99 and sources.py:131. The "list-sources"-command is affected by this bug. that can result in Remote Code Execution(even as root if suricata-update is called by root). This attack appears to be exploitable via a specially crafted yaml-file at https://www.openinfosecfoundation.org/rules/index.yaml. This vulnerability appears to have been fixed in 1.0.0b1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OISF suricata-update | =1.0.0a1 | |
pip/suricata-update | <=1.0.0a1 | 1.0.0b1 |
=1.0.0a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000167 is a vulnerability in OISF suricata-update version 1.0.0a1 which allows remote code execution.
CVE-2018-1000167 has a severity rating of 7.8 (out of 10), making it critical.
CVE-2018-1000167 affects OISF suricata-update version 1.0.0a1 and can be exploited to achieve remote code execution.
The insecure yaml.load function used in the following files of OISF suricata-update version 1.0.0a1 is affected: config.py:136, config.py:142, sources.py:99, and sources.py:131.
To fix CVE-2018-1000167 in OISF suricata-update, update to a version that has addressed the vulnerability.