{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-55628","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2024-12-09T17:48:05.557Z","datePublished":"2025-01-06T18:02:10.692Z","dateUpdated":"2025-01-06T19:14:33.486Z"},"containers":{"cna":{"title":"Suricata oversized resource names utilizing DNS name compression can lead to resource starvation","problemTypes":[{"descriptions":[{"cweId":"CWE-405","lang":"en","description":"CWE-405: Asymmetric Resource Consumption (Amplification)","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-779","lang":"en","description":"CWE-779: Logging of Excessive Data","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j","tags":["x_refsource_CONFIRM"],"url":"https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j"},{"name":"https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951","tags":["x_refsource_MISC"],"url":"https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951"},{"name":"https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d","tags":["x_refsource_MISC"],"url":"https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d"},{"name":"https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d","tags":["x_refsource_MISC"],"url":"https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d"},{"name":"https://redmine.openinfosecfoundation.org/issues/7280","tags":["x_refsource_MISC"],"url":"https://redmine.openinfosecfoundation.org/issues/7280"}],"affected":[{"vendor":"OISF","product":"suricata","versions":[{"version":"< 7.0.8","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-01-06T18:02:10.692Z"},"descriptions":[{"lang":"en","value":"Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8."}],"source":{"advisory":"GHSA-96w4-jqwf-qx2j","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-06T19:14:22.117040Z","id":"CVE-2024-55628","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-06T19:14:33.486Z"}}]}}