CVE-2014-6603: suricata: Out-of-bounds access in SSH parser

Related Vulnerabilities: CVE-2014-6603  

Debian Bug report logs - #762828
CVE-2014-6603: suricata: Out-of-bounds access in SSH parser

version graph

Reported by: Henri Salo <henri@nerv.fi>

Date: Thu, 25 Sep 2014 14:24:02 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in version suricata/2.0.3-1

Fixed in version suricata/2.0.4-1

Done: Pierre Chifflier <pollux@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Pierre Chifflier <pollux@debian.org>:
Bug#762828; Package suricata. (Thu, 25 Sep 2014 14:24:07 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
New Bug report received and forwarded. Copy sent to Pierre Chifflier <pollux@debian.org>. (Thu, 25 Sep 2014 14:24:07 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: submit@bugs.debian.org
Subject: CVE-2014-6603: suricata: Out-of-bounds access in SSH parser
Date: Thu, 25 Sep 2014 17:20:51 +0300
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Package: suricata
Version: 2.0.3-1
Severity: important
Tags: security, fixed-upstream

Hi,

It was found out that the application parser for SSH integrated in Suricata
contains a flaw that might lead to an out-of-bounds access. For this reason a
Denial of Service towards the Suricata monitoring software might be possible
using crafted packets on the monitoring interface.

More information:
http://seclists.org/fulldisclosure/2014/Sep/79
http://suricata-ids.org/2014/09/23/suricata-2-0-4-available/

Feel free to contact me in case you need any help regarding this issue.

- ---
Henri Salo
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlQkJMMACgkQXf6hBi6kbk+bIQCgom59SVZDOvoc9gcNCJJCMgV+
noYAnizbzeHzLPFWkGt8QGm/XiMYwZ3/
=1ooE
-----END PGP SIGNATURE-----



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 25 Sep 2014 15:15:08 GMT) (full text, mbox, link).


Reply sent to Pierre Chifflier <pollux@debian.org>:
You have taken responsibility. (Fri, 10 Oct 2014 11:57:05 GMT) (full text, mbox, link).


Notification sent to Henri Salo <henri@nerv.fi>:
Bug acknowledged by developer. (Fri, 10 Oct 2014 11:57:05 GMT) (full text, mbox, link).


Message #12 received at 762828-close@bugs.debian.org (full text, mbox, reply):

From: Pierre Chifflier <pollux@debian.org>
To: 762828-close@bugs.debian.org
Subject: Bug#762828: fixed in suricata 2.0.4-1
Date: Fri, 10 Oct 2014 11:52:07 +0000
Source: suricata
Source-Version: 2.0.4-1

We believe that the bug you reported is fixed in the latest version of
suricata, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 762828@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Pierre Chifflier <pollux@debian.org> (supplier of updated suricata package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 10 Oct 2014 13:19:59 +0200
Source: suricata
Binary: suricata
Architecture: source amd64
Version: 2.0.4-1
Distribution: unstable
Urgency: high
Maintainer: Pierre Chifflier <pollux@debian.org>
Changed-By: Pierre Chifflier <pollux@debian.org>
Description:
 suricata   - Next Generation Intrusion Detection and Prevention Tool
Closes: 762828
Changes:
 suricata (2.0.4-1) unstable; urgency=high
 .
   * Imported Upstream version 2.0.4
   * Security: fix out-of-bounds access in SSH parser (Closes: #762828)
   * Urgency high, CVE-2014-6603
     Stable and Oldstable versions are not affected.
Checksums-Sha1:
 7e2b9a8590065e0af6cca47670d8a01551791065 1671 suricata_2.0.4-1.dsc
 9463cafb77d3c7f3fc44261dba0f59c0e100620a 3085919 suricata_2.0.4.orig.tar.gz
 2368587f67ac19b5d7f8fb7ee52a4d27386f79aa 8176 suricata_2.0.4-1.debian.tar.xz
 fef06267ab2816763f1cc2ac3f3278c7ee47e241 724426 suricata_2.0.4-1_amd64.deb
Checksums-Sha256:
 28f9e5e92724eeb1d2a2c60b166f36d56e072ef17f677d5da4d6e979284aec02 1671 suricata_2.0.4-1.dsc
 677d97a829d9e05f664c82eb0372e870d5f6e9501ccee20130dfde4014bd5084 3085919 suricata_2.0.4.orig.tar.gz
 b4c1b9f7cda4d6b5660feb26280de3a00ae4f1af71af8988910941f1b3c63a15 8176 suricata_2.0.4-1.debian.tar.xz
 1c07c8ef1ebacdf0ece8738e88066c92ba4ffb4665381e2c21ed635d7342d17b 724426 suricata_2.0.4-1_amd64.deb
Files:
 3d879d66c418f2dee494d348968f04c1 724426 net optional suricata_2.0.4-1_amd64.deb
 c30b8fe78ddd91cb6ac71339d929cd76 1671 net optional suricata_2.0.4-1.dsc
 90eb4368480c46917c145ff2cb0b6b64 3085919 net optional suricata_2.0.4.orig.tar.gz
 da862bee4b615496a26ba758d950b22f 8176 net optional suricata_2.0.4-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBAgAGBQJUN8IXAAoJEFqCeQfe0MQYnL4H/jZXOgxwOwSDBapUvsCm1OaC
9S6jnFL8nuvADWpNs7T7tY72hAqRs9hPV2aDiyTVTY/AQzCKpcqaWBIibRqg+Y5n
dt89lU7Uq07KJ0JKdvZ/nWeZZFlRwBvYpt1FUm2kfiVscjI2kd9WdTyOYclgAl/7
eE7d9VzJLODgwJXQKEA7o3SqtUlh4/0fe59gfl3yIY30FJai1Zg3Mfe43ocNygzj
3zSL4KlOfJ5jDKHN6EmUnYkW3vET8CsK/aOWNjtJq5LRiqpOqkBaBneLFEpQ2Wmr
VjJGp///fOqVIzWeCQuTZ5hL2LkMztf8x7EvmwJ+6meJhFvihhlzN3h49spyQsU=
=ORJR
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 16 Nov 2014 07:30:01 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:51:47 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.