CVE-2019-1010251
Summary
| CVE | CVE-2019-1010251 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-18 18:15:00 UTC |
| Updated | 2019-07-23 18:23:00 UTC |
| Description | Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Oisf | Suricata | 4.0.2 | All | All | All |
| Application | Oisf | Suricata | 4.0.3 | All | All | All |
| Application | Oisf | Suricata | 4.0.5 | All | All | All |
| Application | Oisf | Suricata | 4.1.0 | beta1 | All | All |
| Application | Oisf | Suricata | 4.0.2 | All | All | All |
| Application | Oisf | Suricata | 4.0.3 | All | All | All |
| Application | Oisf | Suricata | 4.0.5 | All | All | All |
| Application | Oisf | Suricata | 4.1.0 | beta1 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Next/20181218/v8 by victorjulien · Pull Request #3590 · OISF/suricata · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Next/20181218/v8 by victorjulien · Pull Request #3590 · OISF/suricata · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Security #2736: DNS Golden Transaction ID - detection bypass - Suricata - Open Information Security Foundation | MISC | redmine.openinfosecfoundation.org | Issue Tracking, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.