CVE-2025-59149
📋 TL;DR
A stack buffer overflow vulnerability in Suricata versions 8.0.0 allows attackers to potentially execute arbitrary code or cause denial of service. The vulnerability triggers when rules using the ldap.responses.attribute_type keyword with transforms are loaded during startup or rule reload. Organizations running Suricata 8.0.0 for network monitoring are affected.
💻 Affected Systems
- Suricata
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, allowing attackers to gain control of the Suricata host and potentially pivot to other systems.
Likely Case
Denial of service causing Suricata to crash, disrupting network monitoring and intrusion detection capabilities.
If Mitigated
Minimal impact if proper network segmentation and access controls prevent external exploitation attempts.
🎯 Exploit Status
Exploitation requires ability to trigger rule reloads or affect Suricata startup with malicious rules. No public exploits known at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.0.1
Vendor Advisory: https://github.com/OISF/suricata/security/advisories/GHSA-vxcg-38x4-gj7j
Restart Required: Yes
Instructions:
1. Download Suricata 8.0.1 from official sources. 2. Stop Suricata service. 3. Backup configuration files. 4. Install new version following platform-specific instructions. 5. Restart Suricata service.
🔧 Temporary Workarounds
Disable vulnerable LDAP rules
allRemove or disable any rules using ldap.responses.attribute_type keyword with transforms
# Review rules files for 'ldap.responses.attribute_type' with transforms
# Comment out or remove affected rules
# Reload Suricata rules: suricatasc -c ruleset-reload-rules
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized rule modifications
- Monitor for Suricata crashes or unexpected restarts and investigate immediately
🔍 How to Verify
Check if Vulnerable:
Check Suricata version with 'suricata -V' and verify if version is 8.0.0. Also check rules for ldap.responses.attribute_type usage.
Check Version:
suricata -V | grep 'version'
Verify Fix Applied:
After patching, verify version is 8.0.1 with 'suricata -V'. Test rule reload functionality.
📡 Detection & Monitoring
Log Indicators:
- Suricata crash logs
- Segmentation fault errors in system logs
- Unexpected Suricata restarts
Network Indicators:
- Sudden drop in network monitoring alerts
- Missing traffic inspection
SIEM Query:
source="suricata" AND ("segmentation fault" OR "crash" OR "buffer overflow")