We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-37151

Suricata defrag: IP ID reuse can lead to policy bypass



Description

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem.

Reserved 2024-06-03 | Published 2024-07-11 | Updated 2024-08-02 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-754: Improper Check for Unusual or Exceptional Conditions

Product status

>= 6.0.0, < 6.0.20
affected

>= 7.0.0,< 7.0.6
affected

References

github.com/...ricata/security/advisories/GHSA-qrp7-g66m-px24

github.com/...ommit/9d5c4273cb7e5ca65f195f7361f0d848c85180e0

github.com/...ommit/aab7f35c76721df19403a7c0c0025feae12f3b6b

redmine.openinfosecfoundation.org/issues/7041

redmine.openinfosecfoundation.org/issues/7042

cve.org (CVE-2024-37151)

nvd.nist.gov (CVE-2024-37151)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-37151

Support options

Helpdesk Chat, Email, Knowledgebase