Vulnerability Details : CVE-2019-10052
Potential exploit
An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.
Products affected by CVE-2019-10052
- cpe:2.3:a:suricata-ids:suricata:4.1.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-10052
0.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-10052
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-10052
-
The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-10052
-
https://redmine.openinfosecfoundation.org/issues/2902
Bug #2902: rust/dhcp: panic in dhcp parser - Suricata - Open Information Security FoundationExploit;Issue Tracking;Third Party Advisory
-
https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/
Suricata 4.1.4 released | SuricataRelease Notes;Vendor Advisory
-
https://redmine.openinfosecfoundation.org/issues/2947
Bug #2947: rust/dhcp: panic in dhcp parser (master) - Suricata - Open Information Security FoundationExploit;Issue Tracking;Third Party Advisory
Jump to