Vulnerability Description
An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Suricata-Ids | Suricata | >= 4.1.0, < 4.1.4 |
Related Weaknesses (CWE)
References
- https://lists.openinfosecfoundation.org/pipermail/oisf-announce/Third Party Advisory
- https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/PatchVendor Advisory
- https://lists.openinfosecfoundation.org/pipermail/oisf-announce/Third Party Advisory
- https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/PatchVendor Advisory
FAQ
What is CVE-2019-10053?
CVE-2019-10053 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This o...
How severe is CVE-2019-10053?
CVE-2019-10053 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-10053?
Check the references section above for vendor advisories and patch information. Affected products include: Suricata-Ids Suricata.