THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-37151

Suricata defrag: IP ID reuse can lead to policy bypass

AssignerGitHub_M
Reserved2024-06-03
Published2024-07-11
Updated2024-07-12

Description

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem.



MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-754: Improper Check for Unusual or Exceptional Conditions

Product status

>= 6.0.0, < 6.0.20
affected

>= 7.0.0,< 7.0.6
affected

References

https://github.com/OISF/suricata/security/advisories/GHSA-qrp7-g66m-px24

https://github.com/OISF/suricata/commit/9d5c4273cb7e5ca65f195f7361f0d848c85180e0

https://github.com/OISF/suricata/commit/aab7f35c76721df19403a7c0c0025feae12f3b6b

https://redmine.openinfosecfoundation.org/issues/7041

https://redmine.openinfosecfoundation.org/issues/7042

cve.org CVE-2024-37151

nvd.nist.gov CVE-2024-37151

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-37151
© Copyright 2024 THREATINT. Made in Cyprus with +