[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
CVE-2014-6603 suricata 2.0.3 Out-of-bounds access in SSH parser
CVE-2014-6603 suricata 2.0.3 Out-of-bounds access in SSH application parser
Suricata is a high performance Network IDS, IPS and Network Security
Monitoring engine developed by the Open Information Security Foundation
2. Summary Information
It was found out that the application parser for SSH integrated in
Suricata contains a flaw that might lead to an out-of-bounds access. For
this reason a Denial of Service towards the Suricata monitoring software
might be possible using crafted packets on the monitoring interface.
3. Technical Description
The application parser for SSH (src/app-layer-ssh.c) contains a function
SSHParseBanner. In case the parsed buffer is either
the function will behave in the wrong way and attempt either a very big
memory allocation or an out of bounds array access with negative index,
which also might lead to out-of-bounds write access under certain
conditions. The problem is caused due to the fact that the end of the
banner and start of the software version are computed independently.
4. Affected versions
Affected versions are Suricata 2.0.3 and 2.1beta1, older versions might
be affected as well.
The issue will be fixed in Suricata 2.0.4 and in the next upcoming major
http://suricata-ids.org/2014/09/23/suricata-2-0-4-available/ for reference.
6. Advisory Timeline
2014-09-12: Reported to vendor by email
2014-09-12: Vendor responded, confirmed and provided preliminary fix
2014-09-17: Requested CVE
2014-09-19: CVE number received
2014-09-23: Vendor reported a fixed version released
The issue was found by