Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-14568

Опубликовано: 23 июл. 2018
Источник: debian
EPSS Низкий

Описание

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
suricatafixed1:4.0.5-1package
suricatano-dsastretchpackage
suricatano-dsajessiepackage

Примечания

  • https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345

  • https://redmine.openinfosecfoundation.org/issues/2501

EPSS

Процентиль: 51%
0.00281
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

CVSS3: 7.5
nvd
больше 7 лет назад

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

CVSS3: 7.5
github
больше 3 лет назад

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

EPSS

Процентиль: 51%
0.00281
Низкий