CVE-2024-55605
📋 TL;DR
This vulnerability in Suricata allows attackers to cause a denial-of-service by sending specially crafted network traffic that triggers a stack overflow in multiple transform functions. It affects all Suricata deployments running versions prior to 7.0.8 that use the vulnerable transform operations.
💻 Affected Systems
- Suricata
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise if the stack overflow can be controlled to execute arbitrary code.
Likely Case
Denial-of-service causing Suricata to crash, disrupting network security monitoring and potentially allowing attacks to go undetected.
If Mitigated
Temporary service disruption until Suricata restarts automatically or manually.
🎯 Exploit Status
Exploitation requires sending specially crafted network traffic to trigger the vulnerable transform functions. No authentication needed as Suricata processes network traffic.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.0.8
Vendor Advisory: https://github.com/OISF/suricata/security/advisories/GHSA-x2hr-33vp-w289
Restart Required: Yes
Instructions:
1. Download Suricata 7.0.8 or later from official sources. 2. Stop Suricata service. 3. Install the updated version. 4. Restart Suricata service. 5. Verify the new version is running.
🔧 Temporary Workarounds
Disable vulnerable transforms
allTemporarily disable the vulnerable transform functions in Suricata configuration if they are not essential for your use case.
Edit suricata.yaml and comment out or remove transform rules using: to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, xor
🧯 If You Can't Patch
- Implement network segmentation to limit traffic to Suricata instances
- Deploy additional IDS/IPS systems in parallel for redundancy during potential outages
🔍 How to Verify
Check if Vulnerable:
Check Suricata version with 'suricata --build-info' or 'suricata -V' and verify it's below 7.0.8
Check Version:
suricata --build-info | grep Version
Verify Fix Applied:
After patching, run 'suricata --build-info' and confirm version is 7.0.8 or higher
📡 Detection & Monitoring
Log Indicators:
- Suricata crash logs
- Segmentation fault errors in system logs
- Unexpected Suricata service restarts
Network Indicators:
- Large or malformed packets targeting Suricata transform functions
- Traffic patterns designed to trigger buffer overflows
SIEM Query:
source="suricata" AND ("segmentation fault" OR "crash" OR "stack overflow")