First published: Mon Feb 26 2024(Updated: )
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.3, specially crafted traffic can cause a heap use after free if the ruleset uses the http.request_header or http.response_header keyword. The vulnerability has been patched in 7.0.3. To work around the vulnerability, avoid the http.request_header and http.response_header keywords.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Suricata | >=7.0.0<7.0.3 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23839 is classified as high severity due to the potential for heap use after free vulnerabilities in Suricata.
To fix CVE-2024-23839, upgrade to Suricata version 7.0.3 or later.
CVE-2024-23839 affects all versions of Suricata prior to 7.0.3.
The impact of CVE-2024-23839 can lead to denial of service or arbitrary code execution due to heap memory corruption.
Affected versions of CVE-2024-23839 are found in Fedora 38 and 39, as well as all Suricata versions prior to 7.0.3.