Vulnerability Description
An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclient inspection will then continue with the wrong rule group. This can lead to missed detection.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suricata-Ids | Suricata | < 3.1.2 |
Related Weaknesses (CWE)
References
- https://github.com/kirillwow/ids_bypassExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00019.htmlThird Party Advisory
- https://redmine.openinfosecfoundation.org/issues/1880Third Party Advisory
- https://suricata-ids.org/2016/09/07/suricata-3-1-2-released/Vendor Advisory
- https://github.com/kirillwow/ids_bypassExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/09/msg00019.htmlThird Party Advisory
- https://redmine.openinfosecfoundation.org/issues/1880Third Party Advisory
- https://suricata-ids.org/2016/09/07/suricata-3-1-2-released/Vendor Advisory
FAQ
What is CVE-2016-10728?
CVE-2016-10728 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclie...
How severe is CVE-2016-10728?
CVE-2016-10728 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10728?
Check the references section above for vendor advisories and patch information. Affected products include: Suricata-Ids Suricata.