Description
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. The bytes setting in the decode_base64 keyword is not properly limited. Due to this, signatures using the keyword and setting can cause large memory allocations of up to 4 GiB per thread. This vulnerability is fixed in 7.0.9.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-29917, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-29917 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- https://capec.mitre.org/data/definitions/125.html
- https://capec.mitre.org/data/definitions/130.html
- https://capec.mitre.org/data/definitions/147.html
- https://capec.mitre.org/data/definitions/197.html
- https://capec.mitre.org/data/definitions/229.html
- https://capec.mitre.org/data/definitions/230.html
- https://capec.mitre.org/data/definitions/231.html
- https://capec.mitre.org/data/definitions/469.html
- https://capec.mitre.org/data/definitions/482.html
- https://capec.mitre.org/data/definitions/486.html
- https://capec.mitre.org/data/definitions/487.html
- https://capec.mitre.org/data/definitions/488.html
- https://capec.mitre.org/data/definitions/489.html
- https://capec.mitre.org/data/definitions/490.html
- https://capec.mitre.org/data/definitions/491.html
- https://capec.mitre.org/data/definitions/493.html
- https://capec.mitre.org/data/definitions/494.html
- https://capec.mitre.org/data/definitions/495.html
- https://capec.mitre.org/data/definitions/496.html
- https://capec.mitre.org/data/definitions/528.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-29917