Actions
Security #4512
closedEvasion possibility on wrong/unexpected ACK value in crafted SYN packets
Git IDs:
54ebee6f516f983a21d952ec6cf4292ed8ba9d8d
Severity:
CRITICAL
Disclosure Date:
Description
affected versions: all
Please see the pcap attached.
Basically it logs no HTTP even with midstream enabled.
The problem is the first packet right away as it has ACK value that we check and disregard the whole flow/session.But Windows and Linux accept those and everyone else it seems.
Please also see attached a test case(py file) and a patch by Eric.
The pcap can not be shared or made public except of the devs with access to this issue of course.
Files
Updated by Jeff Lucovsky over 3 years ago
- Copied from Security #4504: tcp: Evasion possibility on wrong/unexpected ACK value in crafted SYN packets added
Updated by Shivani Bhardwaj over 3 years ago
- Status changed from New to In Review
- Assignee changed from Shivani Bhardwaj to Victor Julien
Updated by Victor Julien over 3 years ago
- Status changed from In Review to Closed
Updated by Victor Julien over 3 years ago
- Priority changed from High to Normal
- CVE set to 2021-35063
- Git IDs updated (diff)
- Severity set to CRITICAL
Actions