Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-18792
HistoryJan 06, 2020 - 12:00 a.m.

CVE-2019-18792

2020-01-0600:00:00
ubuntu.com
ubuntu.com
9

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS

0.01

Percentile

84.1%

An issue was discovered in Suricata 5.0.0. It is possible to bypass/evade
any tcp based signature by overlapping a TCP segment with a fake FIN
packet. The fake FIN packet is injected just before the PUSH ACK packet we
want to bypass. The PUSH ACK packet (containing the data) will be ignored
by Suricata because it overlaps the FIN packet (the sequence and ack number
are identical in the two packets). The client will ignore the fake FIN
packet because the ACK flag is not set. Both linux and windows clients are
ignoring the injected packet.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchsuricata< anyUNKNOWN
ubuntu16.04noarchsuricata< anyUNKNOWN

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS

0.01

Percentile

84.1%