Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10053

Опубликовано: 13 мая 2019
Источник: debian

Описание

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
suricatafixed1:4.1.4-1package
suricatano-dsabusterpackage
suricatano-dsastretchpackage
suricatano-dsajessiepackage

Примечания

  • https://redmine.openinfosecfoundation.org/issues/2883

  • https://github.com/OISF/suricata/commit/51790d3824bc381e24aaeef20338dd6b8bd4e453

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

github
больше 3 лет назад

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.