CVE-2018-14568
Published: 23 July 2018
Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).
Priority
Status
Package | Release | Status |
---|---|---|
suricata Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
focal |
Does not exist
|
|
hirsute |
Does not exist
|
|
xenial |
Needs triage
|
|
jammy |
Not vulnerable
(1:4.0.5-1)
|
|
groovy |
Does not exist
|
|
kinetic |
Not vulnerable
(1:4.0.5-1)
|
|
bionic |
Needs triage
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
lunar |
Not vulnerable
(1:4.0.5-1)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(1:4.0.5-1)
|
|
mantic |
Not vulnerable
(1:4.0.5-1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14568
- https://github.com/OISF/suricata/pull/3428/commits/843d0b7a10bb45627f94764a6c5d468a24143345
- https://github.com/kirillwow/ids_bypass
- https://redmine.openinfosecfoundation.org/issues/2501
- https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/
- NVD
- Launchpad
- Debian