First published: Mon Jan 06 2020(Updated: )
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade any tcp based signature by faking a closed TCP session using an evil server. After the TCP SYN packet, it is possible to inject a RST ACK and a FIN ACK packet with a bad TCP Timestamp option. The client will ignore the RST ACK and the FIN ACK packets because of the bad TCP Timestamp option. Both linux and windows client are ignoring the injected packets.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata-ids Suricata | =5.0.0 | |
Linux Linux kernel | ||
Microsoft Windows | ||
Debian Debian Linux | =8.0 | |
All of | ||
Oisf Suricata | =5.0.0 | |
Any of | ||
Linux Linux kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18625 is a vulnerability discovered in Suricata 5.0.0 that allows for bypassing or evading TCP-based signatures.
The severity of CVE-2019-18625 is high with a CVSS score of 7.5.
CVE-2019-18625 can be exploited by faking a closed TCP session using an evil server and injecting malicious packets with a bad TCP Timestamp option.
Yes, Suricata 5.0.0 is affected by CVE-2019-18625.
To fix CVE-2019-18625, upgrade to a patched version of Suricata.