Vulnerability CVE-2021-37592: Information

Description

Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.

Severity: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Published: Nov. 19, 2021
Modified: Nov. 23, 2021
Error type identifier: CWE-787

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
suricatasisyphus6.0.4-alt16.0.10-alt1ALT-PU-2022-1180-1294444Fixed
suricatac10f16.0.10-alt16.0.10-alt1ALT-PU-2024-3982-2342715Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://github.com/OISF/suricata/releases
  • Release Notes
  • Third Party Advisory
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
  • Release Notes
  • Vendor Advisory
https://redmine.openinfosecfoundation.org/issues/4569
  • Permissions Required
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*
      Start including
      6.0.0
      End excliding
      6.0.4

      cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*
      End excliding
      5.0.8