UBUNTU-CVE-2018-14568

Source
https://ubuntu.com/security/CVE-2018-14568
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-14568.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2018-14568
Related
Published
2018-07-23T20:29:00Z
Modified
2025-01-13T10:21:39Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

References

Affected packages

Ubuntu:Pro:16.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@3.0-1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.8-1build1
2.0.9-1
2.0.10-1
2.0.10-2
2.0.11-1

3.*

3.0-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / suricata

Package

Name
suricata
Purl
pkg:deb/ubuntu/suricata@3.2-2ubuntu3?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.2-2ubuntu3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}