Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-59147

Опубликовано: 01 окт. 2025
Источник: debian

Описание

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
suricatafixed1:8.0.1-1package
suricatafixed1:7.0.10-1+deb13u1trixiepackage
suricatano-dsabookwormpackage

Примечания

  • https://github.com/OISF/suricata/security/advisories/GHSA-v8hv-6v7x-4c2r

  • https://github.com/OISF/suricata/commit/be6315dba0d9101b11d16e9dacfe2822b3792f1b (suricata-8.0.1)

  • https://github.com/OISF/suricata/commit/e91b03c90385db15e21cf1a0e85b921bf92b039e (suricata-7.0.12)

  • https://forum.suricata.io/t/suricata-8-0-1-and-7-0-12-released/6018

Связанные уязвимости

CVSS3: 7.5
ubuntu
4 месяца назад

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.

CVSS3: 7.5
nvd
4 месяца назад

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Versions 7.0.11 and below, as well as 8.0.0, are vulnerable to detection bypass when crafted traffic sends multiple SYN packets with different sequence numbers within the same flow tuple, which can cause Suricata to fail to pick up the TCP session. In IDS mode this can lead to a detection and logging bypass. In IPS mode this will lead to the flow getting blocked. This issue is fixed in versions 7.0.12 and 8.0.1.

CVSS3: 7.5
fstec
5 месяцев назад

Уязвимость системы обнаружения и предотвращения вторжений Suricata, связана с некорректной проверкой безопасности для стандартных элементов, позволяющая нарушителю обойти существующие механизмы безопасности или вызвать отказ в обслуживании