7.5
Advisory Published
Updated

CVE-2021-45098

First published: Thu Dec 16 2021(Updated: )

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Oisf Suricata<6.0.4
Debian Debian Linux=9.0
Debian Debian Linux=10.0
Debian Debian Linux=11.0
<6.0.4
=9.0
=10.0
=11.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability name and ID?

    The vulnerability is named CVE-2021-45098.

  • What is the severity of CVE-2021-45098?

    The severity of CVE-2021-45098 is high with a severity value of 7.5.

  • What software is affected by CVE-2021-45098?

    Suricata versions up to and excluding 6.0.4 and Debian Linux versions 9.0, 10.0, and 11.0 are affected by CVE-2021-45098.

  • Is there a workaround for CVE-2021-45098?

    There is currently no known workaround for CVE-2021-45098.

  • How can I fix CVE-2021-45098?

    To fix CVE-2021-45098, upgrade to Suricata version 6.0.4 or later. Additionally, update Debian Linux to a version that includes the fix.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203