Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
References
Link | Resource |
---|---|
https://redmine.openinfosecfoundation.org/issues/2019 | Issue Tracking Patch Third Party Advisory |
https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/97047 | |
https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html |
Configurations
Information
Published : 2017-03-18 13:59
Updated : 2018-12-05 03:29
NVD link : CVE-2017-7177
Mitre link : CVE-2017-7177
JSON object : View
CWE
CWE-358
Improperly Implemented Security Check for Standard
Products Affected
openinfosecfoundation
- suricata