First published: Wed Feb 07 2018(Updated: )
Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata-ids Suricata | <4.0.4 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-6794.
The severity of CVE-2018-6794 is medium, with a severity value of 5.3.
Suricata versions up to and exclusive of 4.0.4 and Debian Linux version 8.0 are affected by CVE-2018-6794.
If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients.
To fix CVE-2018-6794, update Suricata to version 4.0.4 or higher and update Debian Linux to a version higher than 8.0.