2024-02-14 09:47:22 +00:00

194 lines
9.4 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20203551",
"Version": "oval:org.altlinux.errata:def:20203551",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-3551: package `suricata` update to version 5.0.5-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-3551",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3551",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00358",
"RefURL": "https://bdu.fstec.ru/vul/2018-00358",
"Source": "BDU"
},
{
"RefID": "CVE-2018-14568",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14568",
"Source": "CVE"
},
{
"RefID": "CVE-2018-18956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-18956",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6794",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6794",
"Source": "CVE"
},
{
"RefID": "CVE-2019-10050",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10050",
"Source": "CVE"
},
{
"RefID": "CVE-2019-1010251",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010251",
"Source": "CVE"
},
{
"RefID": "CVE-2019-1010279",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010279",
"Source": "CVE"
}
],
"Description": "This update upgrades suricata to version 5.0.5-alt1. \nSecurity Fix(es):\n\n * BDU:2018-00358: Уязвимость драйвера обработки TCP-пакетов систем обнаружения вторжений Snort и Suricata IDS, позволяющая нарушителю обойти функцию обнаружения сетевых атак\n\n * CVE-2018-14568: Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).\n\n * CVE-2018-18956: The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.\n\n * CVE-2018-6794: Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.\n\n * CVE-2019-10050: A buffer over-read issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the decode-mpls.c function DecodeMPLS is composed only of a packet of source address and destination address plus the correct type field and the right number for shim, an attacker can manipulate the control flow, such that the condition to leave the loop is true. After leaving the loop, the network packet has a length of 2 bytes. There is no validation of this length. Later on, the code tries to read at an empty position, leading to a crash.\n\n * CVE-2019-1010251: Open Information Security Foundation Suricata prior to version 4.1.2 is affected by: Denial of Service - DNS detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed network packet. The component is: app-layer-detect-proto.c, decode.c, decode-teredo.c and decode-ipv6.c (https://github.com/OISF/suricata/pull/3590/commits/11f3659f64a4e42e90cb3c09fcef66894205aefe, https://github.com/OISF/suricata/pull/3590/commits/8357ef3f8ffc7d99ef6571350724160de356158b). The attack vector is: An attacker can trigger the vulnerability by sending a specifically crafted network request. The fixed version is: 4.1.2.\n\n * CVE-2019-1010279: Open Information Security Foundation Suricata prior to version 4.1.3 is affected by: Denial of Service - TCP/HTTP detection bypass. The impact is: An attacker can evade a signature detection with a specialy formed sequence of network packets. The component is: detect.c (https://github.com/OISF/suricata/pull/3625/commits/d8634daf74c882356659addb65fb142b738a186b). The attack vector is: An attacker can trigger the vulnerability by a specifically crafted network TCP session. The fixed version is: 4.1.3.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-12-22"
},
"Updated": {
"Date": "2020-12-22"
},
"bdu": [
{
"Cvss": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"Cwe": "CWE-435",
"Href": "https://bdu.fstec.ru/vul/2018-00358",
"Impact": "High",
"Public": "20180125",
"CveID": "BDU:2018-00358"
}
],
"Cves": [
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14568",
"Impact": "High",
"Public": "20180723",
"CveID": "CVE-2018-14568"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-18956",
"Impact": "High",
"Public": "20181105",
"CveID": "CVE-2018-18956"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"Cwe": "CWE-693",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6794",
"Impact": "Low",
"Public": "20180207",
"CveID": "CVE-2018-6794"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10050",
"Impact": "High",
"Public": "20190513",
"CveID": "CVE-2019-10050"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010251",
"Impact": "High",
"Public": "20190718",
"CveID": "CVE-2019-1010251"
},
{
"Cvss": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"Cvss3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"Cwe": "CWE-347",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010279",
"Impact": "High",
"Public": "20190718",
"CveID": "CVE-2019-1010279"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20203551001",
"Comment": "suricata is earlier than 0:5.0.5-alt1"
}
]
}
]
}
}
]
}