CVE-2018-14568
Published: 23 July 2018
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
Priority
Status
Package | Release | Status |
---|---|---|
suricata Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Not vulnerable
(1:4.0.5-1)
|
|
kinetic |
Not vulnerable
(1:4.0.5-1)
|
|
lunar |
Not vulnerable
(1:4.0.5-1)
|
|
mantic |
Not vulnerable
(1:4.0.5-1)
|
|
noble |
Not vulnerable
(1:4.0.5-1)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(1:4.0.5-1)
|
|
xenial |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
- https://github.com/kirillwow/ids_bypass
- https://redmine.openinfosecfoundation.org/issues/2501
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- https://www.cve.org/CVERecord?id=CVE-2018-14568
- NVD
- Launchpad
- Debian