Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-6794

Опубликовано: 07 фев. 2018
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 5
CVSS3: 5.3

Описание

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

1:4.0.5-1
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needed

esm-apps/jammy

not-affected

1:4.0.5-1
esm-apps/noble

not-affected

1:4.0.5-1
esm-apps/xenial

needed

Показывать по

EPSS

Процентиль: 97%
0.37431
Средний

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
около 8 лет назад

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.

CVSS3: 5.3
debian
около 8 лет назад

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerabili ...

CVSS3: 5.3
github
больше 3 лет назад

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.

fstec
около 8 лет назад

Уязвимость драйвера обработки TCP-пакетов систем обнаружения вторжений Snort и Suricata IDS, позволяющая нарушителю обойти функцию обнаружения сетевых атак

EPSS

Процентиль: 97%
0.37431
Средний

5 Medium

CVSS2

5.3 Medium

CVSS3