CVE-2024-32663

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32663
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32663.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-32663
Aliases
  • GHSA-9jxm-qw9v-266r
Downstream
Published
2024-05-07T14:48:20Z
Modified
2025-10-15T09:27:32.617904Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Suricata 's http2 parser contains an improper compressed header handling can lead to resource starvation
Details

Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.5 and 6.0.19, a small amount of HTTP/2 traffic can lead to Suricata using a large amount of memory. The issue has been addressed in Suricata 7.0.5 and 6.0.19. Workarounds include disabling the HTTP/2 parser and reducing app-layer.protocols.http2.max-table-size value (default is 65536).

References

Affected packages

Git / github.com/OISF/suricata

Affected ranges

Type
GIT
Repo
https://github.com/OISF/suricata
Events
Type
GIT
Repo
https://github.com/OISF/suricata
Events

Affected versions

suricata-6.*

suricata-6.0.0
suricata-6.0.1
suricata-6.0.10
suricata-6.0.11
suricata-6.0.12
suricata-6.0.13
suricata-6.0.14
suricata-6.0.15
suricata-6.0.16
suricata-6.0.17
suricata-6.0.18
suricata-6.0.2
suricata-6.0.3
suricata-6.0.4
suricata-6.0.5
suricata-6.0.6
suricata-6.0.7
suricata-6.0.8
suricata-6.0.9

suricata-7.*

suricata-7.0.0
suricata-7.0.1
suricata-7.0.2
suricata-7.0.3
suricata-7.0.4