First published: Mon May 13 2019(Updated: )
A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oisf Suricata | >=4.0.0<4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10050 is a buffer over-read vulnerability discovered in Suricata 4.1.x before 4.1.4.
CVE-2019-10050 allows an attacker to manipulate the control flow by exploiting a buffer over-read issue in the decode-mpls.c function of Suricata.
CVE-2019-10050 has a severity rating of 7.5 (high).
Suricata versions 4.0.0 to 4.1.3 are affected by CVE-2019-10050.
To fix CVE-2019-10050, upgrade Suricata to version 4.1.4 or later.