Heap-based Buffer Overflow Affecting suricata package, versions *


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-SURICATA-8602399
  • published7 Jan 2025
  • disclosed6 Jan 2025

Introduced: 6 Jan 2025

NewCVE-2024-55627  (opens in a new tab)
CWE-122  (opens in a new tab)
CWE-191  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 suricata.

NVD Description

Note: Versions mentioned in the description apply only to the upstream suricata package and not the suricata package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8.