Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Suricata | Openinfosecfoundation | * | 3.2 (including) |
Suricata | Ubuntu | artful | * |
Suricata | Ubuntu | bionic | * |
Suricata | Ubuntu | cosmic | * |
Suricata | Ubuntu | disco | * |
Suricata | Ubuntu | eoan | * |
Suricata | Ubuntu | esm-apps/bionic | * |
Suricata | Ubuntu | esm-apps/xenial | * |
Suricata | Ubuntu | precise | * |
Suricata | Ubuntu | trusty | * |
Suricata | Ubuntu | upstream | * |
Suricata | Ubuntu | xenial | * |
Suricata | Ubuntu | yakkety | * |
Suricata | Ubuntu | zesty | * |