Remote Code Execution (RCE) Affecting suricata package, versions [4.1.5,4.1.6)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.7% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Remote Code Execution (RCE) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-SURICATA-2384318
  • published26 Jan 2022
  • disclosed6 Jan 2020
  • creditUnknown

Introduced: 6 Jan 2020

CVE-2019-18792  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade suricata to version 4.1.6 or higher.

Overview

Affected versions of this package are vulnerable to Remote Code Execution (RCE). An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade any tcp based signature by overlapping a TCP segment with a fake FIN packet. The fake FIN packet is injected just before the PUSH ACK packet we want to bypass. The PUSH ACK packet (containing the data) will be ignored by Suricata because it overlaps the FIN packet (the sequence and ack number are identical in the two packets). The client will ignore the fake FIN packet because the ACK flag is not set. Both linux and windows clients are ignoring the injected packet.

CVSS Base Scores

version 3.1