Actions
Bug #3573
closed
JL
JL
TCP Fast Open - Bypass of stateless alerts
Bug #3573:
TCP Fast Open - Bypass of stateless alerts
Affected Versions:
Effort:
medium
Difficulty:
Label:
Description
I have successfully verified that Suricata on latest release version v5.0.2 doesn't detect payloads using TFO (TCP Fast Open). Attached is a .pcap file with a directory path traversal payload which reads an /etc/passwd file, suricata rule to trigger alerts on packets which contain /etc/passwd payload so as the suricata.yaml configuration file.
- suricata -V
This is Suricata version 5.0.2 RELEASE
- suricata -c /etc/suricata/suricata.yaml -r tfo.pcap
This issue was addressed by Zeek in October, 2019.
Files
JL Updated by Jeff Lucovsky about 6 years ago
- Copied from Bug #3522: TCP Fast Open - Bypass of stateless alerts added
JL Updated by Jeff Lucovsky about 6 years ago
- Status changed from New to Assigned
JL Updated by Jeff Lucovsky about 6 years ago
- Status changed from Assigned to In Review
JL Updated by Jeff Lucovsky almost 6 years ago
- Status changed from In Review to Closed
Actions