First published: Thu Jul 18 2019(Updated: )
Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Oisf Suricata | =4.0.2 | |
Oisf Suricata | =4.0.3 | |
Oisf Suricata | =4.0.5 | |
Oisf Suricata | =4.1.0-beta1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-1010251.
The severity of CVE-2019-1010251 is high.
CVE-2019-1010251 allows an attacker to evade signature detection with a specially formed network packet.
Suricata versions 4.0.2, 4.0.3, 4.0.5, and 4.1.0-beta1 are affected by CVE-2019-1010251.
To mitigate CVE-2019-1010251, it is recommended to update Suricata to version 4.1.2 or later.