CVE-2024-55628
📋 TL;DR
This vulnerability in Suricata allows attackers to send specially crafted DNS messages with compressed resource names that can cause excessive resource consumption during decoding. Systems running Suricata versions prior to 7.0.8 are affected, potentially leading to denial of service or performance degradation.
💻 Affected Systems
- Suricata
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Denial of service through resource exhaustion, causing Suricata to crash or become unresponsive, potentially disrupting network security monitoring.
Likely Case
Performance degradation and increased resource consumption, leading to dropped packets or missed detections in network traffic analysis.
If Mitigated
Minimal impact with proper rate limiting and monitoring in place, though still vulnerable to targeted attacks.
🎯 Exploit Status
Exploitation requires sending specially crafted DNS packets to the vulnerable Suricata instance, which is straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.0.8
Vendor Advisory: https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j
Restart Required: Yes
Instructions:
1. Download Suricata 7.0.8 or later from official sources. 2. Stop the Suricata service. 3. Install the updated version. 4. Restart the Suricata service. 5. Verify the version is 7.0.8 or higher.
🔧 Temporary Workarounds
DNS Traffic Filtering
allImplement network filtering to block or rate limit DNS traffic to Suricata instances
Resource Monitoring
allIncrease monitoring of Suricata resource usage and implement alerts for abnormal DNS processing
🧯 If You Can't Patch
- Implement strict rate limiting on DNS traffic using network firewalls or load balancers
- Deploy Suricata in a containerized environment with resource limits to prevent complete system exhaustion
🔍 How to Verify
Check if Vulnerable:
Check Suricata version with 'suricata --build-info' or 'suricata -V' and verify it's below 7.0.8
Check Version:
suricata --build-info | grep Version
Verify Fix Applied:
After patching, run 'suricata --build-info' and confirm version is 7.0.8 or higher
📡 Detection & Monitoring
Log Indicators:
- Unusually large DNS log entries
- High CPU/memory usage in Suricata logs
- DNS decoding errors or timeouts
Network Indicators:
- Abnormally large DNS response packets
- High volume of DNS traffic to Suricata instances
SIEM Query:
source="suricata" AND (dns.rrname_size>1000 OR dns.decoding_errors>0) | stats count by src_ip, dest_ip
🔗 References
- https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951
- https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d
- https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d
- https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j
- https://redmine.openinfosecfoundation.org/issues/7280