Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
https://redmine.openinfosecfoundation.org/issues/2019
https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8
https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
http://www.securityfocus.com/bid/97047
Source: Mitre, NVD
Published: 2017-03-18
Updated: 2025-04-20
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
Severity: Medium
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Severity: High
EPSS: 0.00241