CVE-2021-45098
HIGH
7,5
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: none
MEDIUM
5,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: partial
Availability: none
Description
AI Translation Available
An issue was discovered in Suricata before 6.0.4. It is possible to bypass/evade any HTTP-based signature by faking an RST TCP packet with random TCP options of the md5header from the client side. After the three-way handshake, it's possible to inject an RST ACK with a random TCP md5header option. Then, the client can send an HTTP GET request with a forbidden URL. The server will ignore the RST ACK and send the response HTTP packet for the client's request. These packets will not trigger a Suricata reject action.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0065
Percentile
0,7th
Updated
EPSS Score Trend (Last 90 Days)
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Suricata by Oisf
Version Range Affected
To
6.0.4
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Debian Linux by Debian
CPE Identifier
View Detailed Analysis
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df
https://github.com/OISF/suricata/releases
https://lists.debian.org/debian-lts-announce/2025/03/msg00029.html
https://redmine.openinfosecfoundation.org/issues/4710
https://forum.suricata.io/t/suricata-6-0-4-and-5-0-8-released/1942
https://github.com/OISF/suricata/commit/50e2b973eeec7172991bf8f544ab06fb782b97df
https://github.com/OISF/suricata/releases
https://redmine.openinfosecfoundation.org/issues/4710