Vulnerability Description
An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suricata-Ids | Suricata | 4.1.3 |
Related Weaknesses (CWE)
References
- https://redmine.openinfosecfoundation.org/issues/2902ExploitIssue TrackingThird Party Advisory
- https://redmine.openinfosecfoundation.org/issues/2947ExploitIssue TrackingThird Party Advisory
- https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/Release NotesVendor Advisory
- https://redmine.openinfosecfoundation.org/issues/2902ExploitIssue TrackingThird Party Advisory
- https://redmine.openinfosecfoundation.org/issues/2947ExploitIssue TrackingThird Party Advisory
- https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/Release NotesVendor Advisory
FAQ
What is CVE-2019-10052?
CVE-2019-10052 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a pan...
How severe is CVE-2019-10052?
CVE-2019-10052 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10052?
Check the references section above for vendor advisories and patch information. Affected products include: Suricata-Ids Suricata.