Логотип exploitDog
bind:CVE-2021-45098
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-45098

Количество 5

Количество 5

ubuntu логотип

CVE-2021-45098

около 4 лет назад

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2021-45098

около 4 лет назад

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2021-45098

около 4 лет назад

An issue was discovered in Suricata before 6.0.4. It is possible to by ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-cfcf-x7x2-gpf8

около 4 лет назад

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-06804

больше 4 лет назад

Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостаточной проверкой хэш-функции, позволяющая нарушителю реализовать атаку TCP Reset

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2021-45098

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
1%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-45098

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
1%
Низкий
около 4 лет назад
debian логотип
CVE-2021-45098

An issue was discovered in Suricata before 6.0.4. It is possible to by ...

CVSS3: 7.5
1%
Низкий
около 4 лет назад
github логотип
GHSA-cfcf-x7x2-gpf8

An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.

CVSS3: 7.5
1%
Низкий
около 4 лет назад
fstec логотип
BDU:2023-06804

Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостаточной проверкой хэш-функции, позволяющая нарушителю реализовать атаку TCP Reset

CVSS3: 7.5
1%
Низкий
больше 4 лет назад

Уязвимостей на страницу