CVE-2018-14568
Summary
| CVE | CVE-2018-14568 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-23 20:29:00 UTC |
| Updated | 2019-10-03 00:03:00 UTC |
| Description | Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received). |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Suricata-ids | Suricata | All | All | All | All |
| Application | Suricata-ids | Suricata | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Next/20180718/v5 by victorjulien · Pull Request #3428 · OISF/suricata · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Suricata 4.0.5 available! | Suricata | MISC | suricata-ids.org | Vendor Advisory |
| GitHub - kirillwow/ids_bypass: IDS Bypass tricks | MISC | github.com | Exploit, Third Party Advisory |
| Bug #2501: Suricata stops inspecting TCP stream if a TCP RST was met - Suricata - Open Information Security Foundation | MISC | redmine.openinfosecfoundation.org | Exploit, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.