Feature #2767

Interception of network stack attacks

Added by Nikolay Lyamin 5 months ago. Updated 23 days ago.

Target version:


Hello, Team!
Please add the ability to detect bytes in traffic that is not included under the transport or network layer.
For example, a broken UDP packet in which there is a payload for RCE vulnerability. In this packet the size of UDP and IP (fields «Total Length» of IP and «Length» of UDP) was cuted in the hex editor. Only 1 byte for the size of the data is specified in the UDP header (in the image from attach it's Data 06). But the "evil" payload in the packet remained outside UDP |00 00 05 00 01 00 00|. It is not possible to detect this data by suricata.
Best regards, Nikolay Lyamin


attach.png (79.4 KB) attach.png Nikolay Lyamin, 01/09/2019 09:46 AM
udp_corrupt.pcap (90 Bytes) udp_corrupt.pcap Nikolay Lyamin, 01/09/2019 11:59 AM



Updated by Peter Manev 5 months ago

Is it possible to share the actual pcap?


Updated by Nikolay Lyamin 5 months ago

yes, sure


Updated by Victor Julien 3 months ago

I see wireshark shows the extra bytes as 'eth.trailer'. I guess there are several ways we can deal with that: set a decoder event, or add a match that can look at the size, or fully expose the data for content inspection. What would be useful? Normally this data should not reach an application.


Updated by Andreas Herz 23 days ago

  • Assignee set to Community Ticket
  • Target version set to TBD

Also available in: Atom PDF