{"vulnerability": "CVE-2024-55605", "sightings": [{"uuid": "d936943e-6b0e-4928-8cbb-612c930c9008", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3opaw46l2g", "content": "", "creation_timestamp": "2025-01-06T17:43:27.565771Z"}, {"uuid": "34470e69-a814-4849-b2c8-4bed7a0a4297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/osintbot.bsky.social/post/3lzddy34xl22j", "content": "", "creation_timestamp": "2025-09-21T07:16:43.011125Z"}, {"uuid": "7ba68bac-fb52-47d4-9778-14bc788cce1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782530465783993", "content": "", "creation_timestamp": "2025-01-06T17:13:51.994214Z"}, {"uuid": "c3e10f3f-d5b1-48c9-9806-c82d7963ccba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3n6bko2b2m", "content": "", "creation_timestamp": "2025-01-06T17:16:03.831724Z"}, {"uuid": "be7c0aae-4e71-4239-86be-7be35993a264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/ptescalator/199", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-19T13:01:33.000000Z"}, {"uuid": "0f835923-055c-41a8-b192-9a552afd6c79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/cvedetector/14388", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55605 - Suricata Stack-Based Buffer Overflow Vuln\", \n  \"Content\": \"CVE ID : CVE-2024-55605 \nPublished : Jan. 6, 2025, 5:15 p.m. | 43\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T19:26:47.000000Z"}, {"uuid": "ec68bc48-c168-4fdd-bdfd-61250830b718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-55605", "type": "seen", "source": "https://t.me/true_secator/6543", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-16T12:57:32.000000Z"}]}