CVE-2025-64334
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-26

Last updated on: 2025-12-05

Assigner: GitHub, Inc.

Description
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, compressed HTTP data can lead to unbounded memory growth during decompression. This issue has been patched in version 8.0.2. A workaround involves disabling LZMA decompression or limiting response-body-limit size.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-26
Last Modified
2025-12-05
Generated
2026-05-07
AI Q&A
2025-11-27
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
oisf suricata From 8.0.0 (inc) to 8.0.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-770 The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Suricata versions 8.0.0 to before 8.0.2 involves unbounded memory growth during decompression of compressed HTTP data, specifically related to LZMA decompression. This can cause the system to consume excessive memory, potentially leading to denial of service. The issue has been fixed in version 8.0.2, and workarounds include disabling LZMA decompression or limiting the response-body size.


How can this vulnerability impact me? :

The vulnerability can cause unbounded memory growth during decompression, which may lead to denial of service (DoS) by exhausting system resources. This can disrupt network intrusion detection and prevention capabilities, potentially allowing malicious traffic to go undetected or causing system instability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Suricata to version 8.0.2 or later. Alternatively, you can apply a workaround by disabling LZMA decompression or limiting the response-body-limit size in your Suricata configuration.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart