// For flags

CVE-2024-23836

crafted traffic can cause denial of service

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing the traffic than needed, which can lead to extreme slow downs and denial of service. This vulnerability is patched in 6.0.16 or 7.0.3. Workarounds include disabling the affected protocol app-layer parser in the yaml and reducing the `stream.reassembly.depth` value helps reduce the severity of the issue.

Suricata es un sistema de detección de intrusiones en la red, un sistema de prevención de intrusiones y un motor de monitoreo de seguridad de la red. Antes de las versiones 6.0.16 y 7.0.3, un atacante podía manipular el tráfico para hacer que Suricata utilizara mucha más CPU y memoria de la necesaria para procesar el tráfico, lo que puede provocar ralentizaciones extremas y denegación de servicio. Esta vulnerabilidad está parcheada en 6.0.16 o 7.0.3. Los workarounds incluyen deshabilitar el analizador de la capa de aplicación del protocolo afectado en el yaml y reducir el valor `stream.reassembly. Depth` ayuda a reducir la gravedad del problema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-22 CVE Reserved
  • 2024-02-26 CVE Published
  • 2024-02-27 EPSS Updated
  • 2024-08-01 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (19)
URL Tag Source
https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7 X_refsource_misc
https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747 X_refsource_misc
https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7 X_refsource_misc
https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc X_refsource_misc
https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97 X_refsource_misc
https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8 X_refsource_misc
https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786 X_refsource_misc
https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5 X_refsource_misc
https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01 X_refsource_misc
https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af X_refsource_misc
https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc X_refsource_confirm
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P
https://redmine.openinfosecfoundation.org/issues/6531 X_refsource_misc
https://redmine.openinfosecfoundation.org/issues/6532 X_refsource_misc
https://redmine.openinfosecfoundation.org/issues/6540 X_refsource_misc
https://redmine.openinfosecfoundation.org/issues/6658 X_refsource_misc
https://redmine.openinfosecfoundation.org/issues/6659 X_refsource_misc
https://redmine.openinfosecfoundation.org/issues/6660 X_refsource_misc
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
OISF
Search vendor "OISF"
Suricata
Search vendor "OISF" for product "Suricata"
< 6.0.16
Search vendor "OISF" for product "Suricata" and version " < 6.0.16"
en
Affected
OISF
Search vendor "OISF"
Suricata
Search vendor "OISF" for product "Suricata"
>= 7.0.0 < 7.0.3
Search vendor "OISF" for product "Suricata" and version " >= 7.0.0 < 7.0.3"
en
Affected