suricata-ids CVE Vulnerabilities & Metrics

Focus on suricata-ids vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About suricata-ids Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with suricata-ids. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total suricata-ids CVEs: 14
Earliest CVE date: 07 Feb 2018, 05:29 UTC
Latest CVE date: 10 Oct 2019, 01:06 UTC

Latest CVE reference: CVE-2019-17420

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical suricata-ids CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.76

Max CVSS: 7.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 11
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS suricata-ids CVEs

These are the five CVEs with the highest CVSS scores for suricata-ids, sorted by severity first and recency.

All CVEs for suricata-ids

CVE-2019-17420 suricata-ids vulnerability CVSS: 5.0 10 Oct 2019, 01:06 UTC

In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.

CVE-2019-16411 suricata-ids vulnerability CVSS: 7.5 24 Sep 2019, 20:15 UTC

An issue was discovered in Suricata 4.1.4. By sending multiple IPv4 packets that have invalid IPv4Options, the function IPV4OptValidateTimestamp in decode-ipv4.c tries to access a memory region that is not allocated. There is a check for o->len < 5 (corresponding to 2 bytes of header and 3 bytes of data). Then, "flag = *(o->data + 3)" places one beyond the 3 bytes, because the code should have been "flag = *(o->data + 1)" instead.

CVE-2019-16410 suricata-ids vulnerability CVSS: 6.4 24 Sep 2019, 20:15 UTC

An issue was discovered in Suricata 4.1.4. By sending multiple fragmented IPv4 packets, the function Defrag4Reassemble in defrag.c tries to access a memory region that is not allocated, because of a lack of header_len checking.

CVE-2019-15699 suricata-ids vulnerability CVSS: 6.4 24 Sep 2019, 20:15 UTC

An issue was discovered in app-layer-ssl.c in Suricata 4.1.4. Upon receiving a corrupted SSLv3 (TLS 1.2) packet, the parser function TLSDecodeHSHelloExtensions tries to access a memory region that is not allocated, because the expected length of HSHelloExtensions does not match the real length of the HSHelloExtensions part of the packet.

CVE-2019-10056 suricata-ids vulnerability CVSS: 5.0 28 Aug 2019, 21:15 UTC

An issue was discovered in Suricata 4.1.3. The code mishandles the case of sending a network packet with the right type, such that the function DecodeEthernet in decode-ethernet.c is executed a second time. At this point, the algorithm cuts the first part of the packet and doesn't determine the current length. Specifically, if the packet is exactly 28 long, in the first iteration it subtracts 14 bytes. Then, it is working with a packet length of 14. At this point, the case distinction says it is a valid packet. After that it casts the packet, but this packet has no type, and the program crashes at the type case distinction.

CVE-2019-10055 suricata-ids vulnerability CVSS: 7.8 28 Aug 2019, 21:15 UTC

An issue was discovered in Suricata 4.1.3. The function ftp_pasv_response lacks a check for the length of part1 and part2, leading to a crash within the ftp/mod.rs file.

CVE-2019-10054 suricata-ids vulnerability CVSS: 5.0 28 Aug 2019, 21:15 UTC

An issue was discovered in Suricata 4.1.3. The function process_reply_record_v3 lacks a check for the length of reply.data. It causes an invalid memory access and the program crashes within the nfs/nfs3.rs file.

CVE-2019-10052 suricata-ids vulnerability CVSS: 5.0 28 Aug 2019, 20:15 UTC

An issue was discovered in Suricata 4.1.3. If the network packet does not have the right length, the parser tries to access a part of a DHCP packet. At this point, the Rust environment runs into a panic in parse_clientid_option in the dhcp/parser.rs file.

CVE-2019-10051 suricata-ids vulnerability CVSS: 5.0 28 Aug 2019, 20:15 UTC

An issue was discovered in Suricata 4.1.3. If the function filetracker_newchunk encounters an unsafe "Some(sfcm) => { ft.new_chunk }" item, then the program enters an smb/files.rs error condition and crashes.

CVE-2019-10053 suricata-ids vulnerability CVSS: 7.5 13 May 2019, 21:29 UTC

An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.

CVE-2018-18956 suricata-ids vulnerability CVSS: 5.0 05 Nov 2018, 21:29 UTC

The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and daemon crash) via crafted input to the SMTP parser, as exploited in the wild in November 2018.

CVE-2018-14568 suricata-ids vulnerability CVSS: 5.0 23 Jul 2018, 20:29 UTC

Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server. This allows detection bypass because Windows TCP clients proceed with normal processing of TCP data that arrives shortly after an RST (i.e., they act as if the RST had not yet been received).

CVE-2016-10728 suricata-ids vulnerability CVSS: 5.0 23 Jul 2018, 20:29 UTC

An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclient inspection will then continue with the wrong rule group. This can lead to missed detection.

CVE-2018-6794 suricata-ids vulnerability CVSS: 5.0 07 Feb 2018, 05:29 UTC

Suricata before 4.0.4 is prone to an HTTP detection bypass vulnerability in detect.c and stream-tcp.c. If a malicious server breaks a normal TCP flow and sends data before the 3-way handshake is complete, then the data sent by the malicious server will be accepted by web clients such as a web browser or Linux CLI utilities, but ignored by Suricata IDS signatures. This mostly affects IDS signatures for the HTTP protocol and TCP stream content; signatures for TCP packets will inspect such network traffic as usual.