Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2197
HistoryJul 25, 2023 - 10:14 a.m.

Advisory ROSA-SA-2023-2197

2023-07-2510:14:11
ROSA LAB
abf.rosalinux.ru
8
suricata 6.0.12
rosa-chrome
tcp evasion
http bypass
critical vulnerability
high vulnerability
fixed
update command

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.7%

software: suricata 6.0.12
WASP: ROSA-CHROME

package_evr_string: suricata-6.0.12-1.src.rpm

CVE-ID: CVE-2021-37592
BDU-ID: None
CVE-Crit: CRITICAL
CVE-DESC.: Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a TCP/IP stack created that can send a specific sequence of segments.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update suricata

CVE-ID: CVE-2021-45098
BDU-ID: None
CVE-Crit: HIGH
CVE-DESC.: It is possible to bypass / evade any HTTP-based signature by forging an RST TCP packet with random client-side TCP header md5 parameters. After a three-step handshake, an RST ACK with a random TCP md5header parameter can be injected. The client can then send an HTTP GET request with the forbidden URL. The server will ignore the RST ACK and send an HTTP response packet to the client request. These packets will not trigger the Suricata reject action.
CVE-STATUS: Fixed
CVE-REV: To close, run the command: sudo dnf update suricata

OSVersionArchitecturePackageVersionFilename
ROSAanynoarchsuricata< 6.0.12UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

69.7%