Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52827 | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 31 Mar 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oisf
Oisf suricata |
|
| Weaknesses | CWE-436 | |
| CPEs | cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Oisf
Oisf suricata |
Mon, 06 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set. | |
| Title | Suricata generic detection bypass using TCP urgent support | |
| Weaknesses | CWE-437 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-06T18:51:58.364Z
Reserved: 2024-12-09T17:48:05.557Z
Link: CVE-2024-55629
Updated: 2025-01-06T18:51:48.571Z
Status : Analyzed
Published: 2025-01-06T18:15:23.130
Modified: 2025-03-31T12:54:16.233
Link: CVE-2024-55629
No data.
OpenCVE Enrichment
No data.
EUVD