Impact
Suricata’s DCERPC buffering routine contains a quadratic complexity path that can be triggered by specially crafted DCERPC packets. When an attacker sends a large or malformed request, the buffering routine may consume excessive CPU cycles, temporarily halting or slowing other network inspection tasks. This can lead to a denial of service for the sensor and it is an example of a processor exhaustion vulnerability (CWE‑407).
Affected Systems
The issue affects OISF Suricata deployments built before version 7.0.15. Versions 7.0.15 and later contain the fix that removes the inefficient buffering code. If you are running an older build, consider it impacted until the patch is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity vulnerability. Exploit probability data is not publicly disclosed. The vulnerability is not listed in the known exploited vulnerabilities catalog. The likely attack vector is network‑based: a remote attacker can send malicious DCERPC traffic to trigger the inefficiency, resulting in resource exhaustion and service degradation.
OpenCVE Enrichment