CVE-2017-7177

Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openinfosecfoundation:suricata:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:31

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/97047 - () http://www.securityfocus.com/bid/97047 -
References () https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 - Issue Tracking, Patch, Third Party Advisory () https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html - () https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html -
References () https://redmine.openinfosecfoundation.org/issues/2019 - Issue Tracking, Patch, Third Party Advisory () https://redmine.openinfosecfoundation.org/issues/2019 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2017-03-18 20:59

Updated : 2024-11-21 03:31


NVD link : CVE-2017-7177

Mitre link : CVE-2017-7177

CVE.ORG link : CVE-2017-7177


JSON object : View

Products Affected

openinfosecfoundation

  • suricata
CWE
CWE-358

Improperly Implemented Security Check for Standard