Project

General

Profile

Actions

Security #6770

closed

log: arbitrary-length value can be logged

Added by Philippe Antoine over 1 year ago. Updated 7 days ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Label:
CVE:
Git IDs:
Severity:
HIGH
Disclosure Date:
02/19/2024

Description

Found by oss-fuzz:
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64345&q=label%3AProj-suricata&can=2

Fuzz target triggers the following rule
alert tcp any any -> any any (msg:"SURICATA STREAM ESTABLISHED packet out of window"; stream-event:est_packet_out_of_window; classtype:protocol-command-decode; sid:2210020; rev:2;)
on many packets leading to most time spent in jsonbuild set_string_from_bytes (doing escaping on binary buffer) for dummy overlong ssh software version


Files

sshlong.pcap (552 KB) sshlong.pcap Philippe Antoine, 02/12/2024 12:05 PM

Subtasks


Related issues 6 (0 open6 closed)

Related to Suricata - Bug #6846: eve/alerts: wrongly using tx id 0 when there is no txClosedPhilippe AntoineActions
Related to Suricata - Security #6900: http2: timeout logging headersClosedPhilippe AntoineActions
Related to Suricata - Bug #6984: mqtt: do not log non-string messages?ClosedSascha SteinbissActions
Related to Suricata - Security #6987: modbus: txs without responses are never freedClosedPhilippe AntoineActions
Related to Suricata - Security #7085: eve: transactions can be logged an arbitrary number of timesClosedPhilippe AntoineActions
Copied to Suricata - Security #6866: eve: excessive ssh long banner loggingClosedPhilippe AntoineActions
Actions

Also available in: Atom PDF