{"vulnerability": "CVE-2024-55628", "sightings": [{"uuid": "d3eae665-d103-418d-9182-dddb7839c161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113782729492440784", "content": "", "creation_timestamp": "2025-01-06T18:04:28.799624Z"}, {"uuid": "0c629243-dc68-4fc2-8bb5-b74ab6198785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lf3qjjqxfs2m", "content": "", "creation_timestamp": "2025-01-06T18:16:02.887965Z"}, {"uuid": "a9a4d12c-eb2a-4666-9167-1b21ad2ba813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lf3s2nw6gd2y", "content": "", "creation_timestamp": "2025-01-06T18:43:34.707096Z"}, {"uuid": "2283c137-9386-48e0-96e5-6dc3bfef9913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://t.me/ptescalator/199", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-19T13:01:33.000000Z"}, {"uuid": "9f3896ac-5b66-48cf-9197-65ad60a403e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://t.me/cvedetector/14397", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-55628 - Suricata DNS Resource Name Compression Denial of Service Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-55628 \nPublished : Jan. 6, 2025, 6:15 p.m. | 44\u00a0minutes ago \nDescription : Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-06T20:17:37.000000Z"}, {"uuid": "ff052946-5bb4-40bf-a098-a17b54ac624f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-55628", "type": "seen", "source": "https://t.me/true_secator/6543", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Suricata \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 7.0.8 \u0441\u0432\u043e\u0435\u0439 IDS/IPS-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u0432\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445, CVE-2024-55627 \u0438 CVE-2024-55605, \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435, CVE-2024-55628 \u0438 CVE-2024-55629 \u043e\u0442\u043d\u0435\u0441\u0435\u043d\u044b \u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u044b\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c, \u0438 \u043e\u0441\u0442\u0430\u0432\u0448\u0430\u044f\u0441\u044f CVE-2024-55626 - \u043a \u043d\u0438\u0437\u043a\u043e\u043c\u0443.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c: \u0410\u043b\u0435\u043a\u0441\u0435\u0439 \u0421\u0438\u043c\u0430\u043a\u043e\u0432, \u041d\u043e\u0439 \u041b\u044e, \u0420\u043e\u043c\u0430\u043d \u0415\u0436\u043e\u0432 (Positive Technologies), \u0421\u0430\u0448\u0430 \u0421\u0442\u0435\u0439\u043d\u0431\u0438\u0441\u0441, \u0421\u0438\u043c\u0435\u043d \u041b\u0438\u0431\u0435\u043a\u043a, Team Superflat, \u0417\u0435\u043c\u0435\u0442\u0440\u0438 \u041a\u0430\u043c\u0438\u043c\u0438\u0434\u0437\u0443, Oss-Fuzz, Coverity.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043a\u0430 \u043c\u0430\u043b\u043e, \u0431\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-12-16T12:57:32.000000Z"}]}