First published: Tue May 07 2024(Updated: )
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, specially crafted traffic or datasets can cause a limited buffer overflow. This vulnerability is fixed in 7.0.5 and 6.0.19. Workarounds include not use rules with `base64_decode` keyword with `bytes` option with value 1, 2 or 5 and for 7.0.x, setting `app-layer.protocols.smtp.mime.body-md5` to false.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OISF Suricata | >=6.0.0<6.0.19 | |
OISF Suricata | >=7.0.0<7.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-32664 is classified as a limited buffer overflow vulnerability affecting Suricata versions prior to 6.0.19 and 7.0.5.
To fix CVE-2024-32664, upgrade Suricata to version 6.0.19 or 7.0.5 or later.
CVE-2024-32664 affects Suricata versions 6.0.0 to 6.0.18 and 7.0.0 to 7.0.4.
CVE-2024-32664 can be exploited through specially crafted traffic or datasets that trigger the buffer overflow.
Temporary workarounds for CVE-2024-32664 involve restrictions on the type of traffic processed by Suricata before the software is updated.