[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1751-1] suricata security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : suricata
Version        : 2.0.7-2+deb8u4
CVE ID         : CVE-2018-10242 CVE-2018-10243

Multiple vulnerabilities have been found in suricata, the network threat
detection engine:

CVE-2018-10242

    Missing length check causing out-of-bounds read in SSHParseBanner
    (app-layer-ssh.c). Remote attackers might leverage this vulnerability
    to cause DoS or potentially unauthorized disclosure of information.

CVE-2018-10243

    Unexpected end of Authorization field causing heap-based buffer
    over-read in htp_parse_authorization_digest (htp_parsers.c, from the
    embedded copy of LibHTP). Remote attackers might leverage this
    vulnerability to cause DoS or potentially unauthorized disclosure of
    information.

For Debian 8 "Jessie", these problems have been fixed in version
2.0.7-2+deb8u4.

We recommend that you upgrade your suricata packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEUFZhdgIWqBhwqCvuZYVUZx9w0DQFAlyrr9IACgkQZYVUZx9w
0DS9pwf8CaaH8wtJJiiq4KpWMmgZvIixU8abzUUSJa14tzwKOc6/ZYuWrlF/Qlby
GEtnawfWy1SoshxIZjZEL0S79uFMuh24qvT8CqDhVTiOvr7WWHZJ9V8x6Wf7fIsg
NV6Lm9BifJpRgip/dFhNtl1DltJc6FrdPFhIPXEu6nJxTOPWYjlnTRwZmKBY5Ovj
Z1vLlrplpffUUW+Fx8c0yOEur41loUd/Kisep3+INi5jRlBgyK/Sk8tQMH/1Xb5r
6WbJLK0OTbVxAXF4RLwqtSicPU7voDOp/NjR+ghtpLdbsk17qvUoyb9PdOzXB+sn
tUJlpX/CBUmAXP8ng/J/OdarpLI/kw==
=eexm
-----END PGP SIGNATURE-----


Reply to: