ESB-2019.1215 - [Win][UNIX/Linux][Debian] suricata: Multiple vulnerabilities 2019-04-10

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1215
                         suricata security update
                               10 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:          suricata
Publisher:        Debian
Operating System: Debian GNU/Linux 8
                  UNIX variants (UNIX, Linux, OSX)
                  Windows
Impact/Access:    Denial of Service        -- Remote/Unauthenticated
                  Access Confidential Data -- Remote/Unauthenticated
Resolution:       Patch/Upgrade
CVE Names:        CVE-2018-10243 CVE-2018-10242 

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running suricata check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : suricata
Version        : 2.0.7-2+deb8u4
CVE ID         : CVE-2018-10242 CVE-2018-10243

Multiple vulnerabilities have been found in suricata, the network threat
detection engine:

CVE-2018-10242

    Missing length check causing out-of-bounds read in SSHParseBanner
    (app-layer-ssh.c). Remote attackers might leverage this vulnerability
    to cause DoS or potentially unauthorized disclosure of information.

CVE-2018-10243

    Unexpected end of Authorization field causing heap-based buffer
    over-read in htp_parse_authorization_digest (htp_parsers.c, from the
    embedded copy of LibHTP). Remote attackers might leverage this
    vulnerability to cause DoS or potentially unauthorized disclosure of
    information.

For Debian 8 "Jessie", these problems have been fixed in version
2.0.7-2+deb8u4.

We recommend that you upgrade your suricata packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEUFZhdgIWqBhwqCvuZYVUZx9w0DQFAlyrr9IACgkQZYVUZx9w
0DS9pwf8CaaH8wtJJiiq4KpWMmgZvIixU8abzUUSJa14tzwKOc6/ZYuWrlF/Qlby
GEtnawfWy1SoshxIZjZEL0S79uFMuh24qvT8CqDhVTiOvr7WWHZJ9V8x6Wf7fIsg
NV6Lm9BifJpRgip/dFhNtl1DltJc6FrdPFhIPXEu6nJxTOPWYjlnTRwZmKBY5Ovj
Z1vLlrplpffUUW+Fx8c0yOEur41loUd/Kisep3+INi5jRlBgyK/Sk8tQMH/1Xb5r
6WbJLK0OTbVxAXF4RLwqtSicPU7voDOp/NjR+ghtpLdbsk17qvUoyb9PdOzXB+sn
tUJlpX/CBUmAXP8ng/J/OdarpLI/kw==
=eexm
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=PU7Q
-----END PGP SIGNATURE-----

« Back to bulletins