7.5
CWE
125
Advisory Published
Updated

CVE-2019-10050

First published: Mon May 13 2019(Updated: )

A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Oisf Suricata>=4.0.0<4.1.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-10050?

    CVE-2019-10050 is a buffer over-read vulnerability discovered in Suricata 4.1.x before 4.1.4.

  • How does CVE-2019-10050 work?

    CVE-2019-10050 allows an attacker to manipulate the control flow by exploiting a buffer over-read issue in the decode-mpls.c function of Suricata.

  • What is the severity of CVE-2019-10050?

    CVE-2019-10050 has a severity rating of 7.5 (high).

  • Which software versions are affected by CVE-2019-10050?

    Suricata versions 4.0.0 to 4.1.3 are affected by CVE-2019-10050.

  • How can I fix CVE-2019-10050?

    To fix CVE-2019-10050, upgrade Suricata to version 4.1.4 or later.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203