{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-23836", "ASSIGNER": "security-advisories@github.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to versions 6.0.16 and 7.0.3, an attacker can craft traffic to cause Suricata to use far more CPU and memory for processing the traffic than needed, which can lead to extreme slow downs and denial of service. This vulnerability is patched in 6.0.16 or 7.0.3. Workarounds include disabling the affected protocol app-layer parser in the yaml and reducing the `stream.reassembly.depth` value helps reduce the severity of the issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-770: Allocation of Resources Without Limits or Throttling", "cweId": "CWE-770" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "OISF", "product": { "product_data": [ { "product_name": "suricata", "version": { "version_data": [ { "version_affected": "=", "version_value": "< 6.0.16" }, { "version_affected": "=", "version_value": ">= 7.0.0, < 7.0.3" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc", "refsource": "MISC", "name": "https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc" }, { "url": "https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7" }, { "url": "https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747" }, { "url": "https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7" }, { "url": "https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc" }, { "url": "https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97" }, { "url": "https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8" }, { "url": "https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786" }, { "url": "https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5" }, { "url": "https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01" }, { "url": "https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af", "refsource": "MISC", "name": "https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6531", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6531" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6532", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6532" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6540", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6540" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6658", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6658" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6659", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6659" }, { "url": "https://redmine.openinfosecfoundation.org/issues/6660", "refsource": "MISC", "name": "https://redmine.openinfosecfoundation.org/issues/6660" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", "refsource": "MISC", "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/" } ] }, "source": { "advisory": "GHSA-q33q-45cr-3cpc", "discovery": "UNKNOWN" }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ] } }