Project

General

Profile

Actions

Bug #3857

closed

Protocol detection evasion by packet splitting on enip/dnp3

Added by Victor Julien over 4 years ago. Updated about 4 years ago.

Status:
Closed
Priority:
Normal
Target version:
Affected Versions:
Effort:
Difficulty:
Label:
Needs backport, Needs backport to 4.1, Needs backport to 5.0

Description

https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=24601

./src/fuzz_applayerprotodetectgetproto ~/Downloads/clusterfuzz-testcase-minimized-fuzz_applayerprotodetectgetproto-5683474829410304
Assertion failure : With input length 24, found enip instead of dnp3
Aborted

Files


Related issues 3 (0 open3 closed)

Related to Suricata - Bug #3689: Protocol detection evasion by packet splitting on enip/nfsClosedPhilippe AntoineActions
Copied to Suricata - Bug #3939: Protocol detection evasion by packet splitting on enip/dnp3ClosedShivani BhardwajActions
Copied to Suricata - Bug #3940: Protocol detection evasion by packet splitting on enip/dnp3ClosedPhilippe AntoineActions
Actions

Also available in: Atom PDF