First published: Wed Aug 28 2019(Updated: )
An issue was discovered in Suricata 4.1.3. The code mishandles the case of sending a network packet with the right type, such that the function DecodeEthernet in decode-ethernet.c is executed a second time. At this point, the algorithm cuts the first part of the packet and doesn't determine the current length. Specifically, if the packet is exactly 28 long, in the first iteration it subtracts 14 bytes. Then, it is working with a packet length of 14. At this point, the case distinction says it is a valid packet. After that it casts the packet, but this packet has no type, and the program crashes at the type case distinction.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata-ids Suricata | =4.1.3 | |
Suricata-ids Suricata | =4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10056 is a vulnerability discovered in Suricata 4.1.3 and 4.1.4 that mishandles the case of sending a network packet with the right type, leading to code execution.
CVE-2019-10056 has a severity score of 7.5 (high).
Suricata versions 4.1.3 and 4.1.4 are affected by CVE-2019-10056.
To fix CVE-2019-10056, update Suricata to version 4.1.5 or later.
CWE-787 is a common weakness enumeration category that refers to a specific type of vulnerability related to the improper access control of a resource.