First published: Mon May 13 2019(Updated: )
An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata-ids Suricata | >=4.1.0<4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10053 is a vulnerability discovered in Suricata 4.1.x before 4.1.4 that can lead to a heap-based buffer over-read due to an integer underflow.
CVE-2019-10053 has a severity rating of 9.8, which is classified as critical.
Suricata versions between 4.1.0 and 4.1.4 are affected by CVE-2019-10053.
To fix CVE-2019-10053, update Suricata to version 4.1.4 or later.
More information about CVE-2019-10053 can be found in the reference links provided: [link1](https://lists.openinfosecfoundation.org/pipermail/oisf-announce/) and [link2](https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/).