In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade suricata to version 7.0.13, 8.0.2 or higher.
Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the verdict when logging eve.alert and eve.drop records. An attacker can cause a crash by filling the per packet alert queue with alerts and then triggering a pass rule.
Note: This is only exploitable if the per packet alert queue is filled with alerts and a pass rule is subsequently applied.
This vulnerability can be mitigated by increasing the alert queue size (packet-alert-max) in the configuration if verdict is enabled.