An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

  • Published Date: Monday 13th of May 2019 05:29:01 PM
  • Modified Date: Tuesday 14th of May 2019 12:34:22 PM
    • Network Access Vector: The attacker does not require local network access or local access.
    • Authentication Vector: Authentication is not required to access and exploit the vulnerability.
    • Complexity Vector: The attack can be performed manually and requires little skill or additional information gathering.
    • Availability Impact: There is reduced performance or interruptions in resource availability.
    • Integrity Impact: Modification of some system files is posible.
    • Confidentiality Impact: There is considerable information disclosure.
    • CVSS Score: 7.5
    • Common Platform Enumeration (CPE) Dictionary
      • cpe:2.3:a:suricata-ids:suricata:4.1.0:b1
    • Reference:

    Download Mageni's Vulnerability Scanning Platform.

    No credit card is required to download the Free Edition. Register now.