Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64331: CWE-121: Stack-based Buffer Overflow in OISF suricata

0
High
VulnerabilityCVE-2025-64331cvecve-2025-64331cwe-121
Published: Wed Nov 26 2025 (11/26/2025, 23:00:40 UTC)
Source: CVE Database V5
Vendor/Project: OISF
Product: suricata

Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.

AI-Powered Analysis

AILast updated: 12/03/2025, 23:49:11 UTC

Technical Analysis

CVE-2025-64331 is a stack-based buffer overflow vulnerability identified in the Open Information Security Foundation's Suricata network IDS/IPS and NSM engine. Suricata versions prior to 7.0.13 and 8.0.2 are affected. The vulnerability arises when the HTTP response body limit is increased beyond default settings and the logging of printable HTTP bodies is enabled. Under these conditions, processing large HTTP file transfers can cause a stack overflow, leading to potential crashes or denial of service. This vulnerability is classified under CWE-121, indicating improper handling of buffer boundaries on the stack. The flaw does not require any privileges or user interaction to exploit, as it can be triggered remotely by sending specially crafted HTTP traffic that exceeds the configured limits. The impact is primarily on availability, as the overflow can cause Suricata to crash, disrupting network monitoring and intrusion detection capabilities. No confidentiality or integrity impacts are reported. The issue has been addressed in Suricata versions 7.0.13 and 8.0.2. As a workaround, users can revert to default HTTP response body limits and disable the logging of printable HTTP bodies, which is disabled by default. No known exploits have been observed in the wild to date, but the vulnerability's characteristics make it a significant risk for denial of service attacks against Suricata deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security monitoring and intrusion detection capabilities. Suricata is widely used in enterprise, government, and critical infrastructure sectors across Europe for real-time network traffic analysis. A successful exploitation could cause Suricata to crash, resulting in loss of visibility into network threats and potential blind spots for attackers. This is particularly critical for sectors such as finance, energy, telecommunications, and public administration, where continuous monitoring is essential for security and compliance. The denial of service impact could also disrupt incident response and forensic investigations. Since the vulnerability can be triggered remotely without authentication, attackers could exploit it from outside the network perimeter, increasing the threat surface. Although no data confidentiality or integrity loss is expected, the availability impact alone can have cascading effects on organizational security posture and operational continuity.

Mitigation Recommendations

European organizations should prioritize upgrading Suricata to versions 7.0.13 or 8.0.2 or later, where the vulnerability is patched. Until upgrades can be applied, administrators should revert any increased HTTP response body limits back to default values and disable the logging of printable HTTP bodies, which is off by default. Network security teams should audit current Suricata configurations to identify if these settings have been modified. Implementing strict network segmentation and filtering to limit exposure of Suricata management interfaces and monitoring points can reduce attack surface. Continuous monitoring for Suricata process crashes or unusual HTTP traffic patterns indicative of exploitation attempts should be established. Additionally, integrating Suricata logs with SIEM solutions can help detect anomalies related to this vulnerability. Organizations should also maintain up-to-date incident response plans to quickly address potential denial of service incidents affecting network monitoring.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-30T17:40:52.029Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 692788ccd322a87b22e671bd

Added to database: 11/26/2025, 11:10:04 PM

Last enriched: 12/3/2025, 11:49:11 PM

Last updated: 1/11/2026, 6:15:51 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats