CVE-2025-64331

Source
https://cve.org/CVERecord?id=CVE-2025-64331
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64331.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-64331
Aliases
  • GHSA-v32w-j79x-pfj2
Downstream
Published
2025-11-26T23:00:40.264Z
Modified
2026-02-03T07:40:09.603408Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Suricata is vulnerable to a stack overflow on large file transfers with http-body-printable
Details

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, a stack overflow can occur on large HTTP file transfers if the user has increased the HTTP response body limit and enabled the logging of printable http bodies. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves using default HTTP response body limits and/or disabling http-body-printable logging; body logging is disabled by default.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64331.json",
    "cwe_ids": [
        "CWE-121"
    ]
}
References

Affected packages

Git / github.com/oisf/suricata

Affected ranges

Type
GIT
Repo
https://github.com/oisf/suricata
Events

Affected versions

suricata-8.*
suricata-8.0.0
suricata-8.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-64331.json"