Project

General

Profile

Actions

Security #4484

closed

Security #4483: heap-buffer-overflow WRITE in InspectionBufferSetup with use of InspectionBufferGetMulti

Infinite loops in when using InspectionBufferMultipleForList

Added by Jeff Lucovsky over 1 year ago. Updated over 1 year ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Label:
CVE:
Git IDs:

234cafdcfe84f2d83c4e08244e78fe656af525d1
07669cd70a1cd699919eeb4c8097898ffe40f5d3
2f3524f7e23d437cbc1424382f3aa6fdbacc79ae
e49b5358f9e075dd85365d8451180684f79e5825

Severity:
MODERATE

Description

From https://github.com/OISF/suricata/pull/5622#discussion_r626686822

POC is in #4476 once the buffer overflow gets fixed

Root cause is integer loss of precision casting local_id to uint16_t when there can more than 65536 buffers in a transaction

This may be not the case for dns.query as the maximum PDU length is 65536
But this is definitely the case for MQTT (subscribe topics) where Suricata default maximum PDU is 1Mbyte


Related issues 1 (0 open1 closed)

Copied from Bug #4477: Infinite loops in when using InspectionBufferMultipleForListClosedPhilippe AntoineActions
Actions

Also available in: Atom PDF