CVE-2025-64334

7.5 HIGH

📋 TL;DR

This vulnerability in Suricata allows an attacker to cause unbounded memory growth by sending specially crafted compressed HTTP data, potentially leading to denial of service (DoS) due to resource exhaustion. It affects Suricata versions 8.0.0 to 8.0.1, impacting users running these versions for network intrusion detection, prevention, or monitoring.

💻 Affected Systems

Products:
  • Suricata
Versions: 8.0.0 to 8.0.1
Operating Systems: All operating systems running affected Suricata versions
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default configurations where Suricata processes HTTP traffic with compression enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or unavailability of Suricata due to memory exhaustion, disrupting network security monitoring and potentially allowing undetected attacks.

🟠

Likely Case

Degraded performance or temporary DoS of Suricata, reducing its effectiveness in detecting threats until memory is freed or the service is restarted.

🟢

If Mitigated

Minimal impact with proper patching or workarounds, maintaining normal Suricata functionality and security coverage.

🌐 Internet-Facing: HIGH, as Suricata often processes traffic from external sources, making it susceptible to exploitation via malicious HTTP requests from the internet.
🏢 Internal Only: MEDIUM, as internal network traffic could also be used to trigger the vulnerability, though it may be less likely than external attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending compressed HTTP data, which is straightforward, but no public proof-of-concept has been disclosed as of the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.2

Vendor Advisory: https://github.com/OISF/suricata/security/advisories/GHSA-r5jf-v2gx-gx8w

Restart Required: Yes

Instructions:

1. Download Suricata version 8.0.2 from the official repository. 2. Follow the installation instructions for your OS to upgrade. 3. Restart the Suricata service to apply the patch.

🔧 Temporary Workarounds

Disable LZMA decompression

all

Prevents processing of LZMA-compressed HTTP data to avoid triggering the vulnerability.

Edit Suricata configuration file (e.g., suricata.yaml) and set 'decompression-lzma: no' under the 'http' section.

Limit response-body-limit size

all

Restricts the maximum size of decompressed HTTP responses to mitigate memory growth.

Edit Suricata configuration file and set 'response-body-limit' to a lower value, e.g., 'response-body-limit: 1mb'.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Suricata from untrusted traffic sources.
  • Monitor system memory usage and logs for signs of abnormal growth, and have an incident response plan ready.

🔍 How to Verify

Check if Vulnerable:

Check the Suricata version by running 'suricata --build-info' and verify if it is between 8.0.0 and 8.0.1.

Check Version:

suricata --build-info | grep 'Version'

Verify Fix Applied:

After patching, confirm the version is 8.0.2 or higher using 'suricata --build-info' and test with sample compressed HTTP traffic to ensure no memory issues.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory usage spikes in system logs
  • Suricata process crashes or restarts in application logs

Network Indicators:

  • High volume of compressed HTTP requests to Suricata instances
  • Abnormal traffic patterns targeting Suricata ports

SIEM Query:

Example: 'source="suricata" AND (event_type="alert" AND alert.signature_id=* AND alert.category="Generic Protocol Command Decode")' adjusted for memory-related alerts.

🔗 References

📤 Share & Export