Project

General

Profile

Actions

Security #4513

closed

Evasion possibility on wrong/unexpected ACK value in crafted SYN packets

Added by Jeff Lucovsky almost 3 years ago. Updated over 2 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Label:
Git IDs:

f61ef79781605a5d1d75d8bf023da9552f781301

Severity:
CRITICAL
Disclosure Date:

Description

affected versions: all

Please see the pcap attached.
Basically it logs no HTTP even with midstream enabled.

The problem is the first packet right away as it has ACK value that we check and disregard the whole flow/session.But Windows and Linux accept those and everyone else it seems.

Please also see attached a test case(py file) and a patch by Eric.

The pcap can not be shared or made public except of the devs with access to this issue of course.


Files


Related issues 1 (0 open1 closed)

Copied from Suricata - Security #4504: tcp: Evasion possibility on wrong/unexpected ACK value in crafted SYN packetsClosedEric LeblondActions
Actions #1

Updated by Jeff Lucovsky almost 3 years ago

  • Copied from Security #4504: tcp: Evasion possibility on wrong/unexpected ACK value in crafted SYN packets added
Actions #2

Updated by Jeff Lucovsky almost 3 years ago

  • Status changed from Assigned to In Progress

Cherry-picks:
- 91f830afd1fb3276448eb60ce8832fc383612820
- a21fe46244d63f87e7e8ef4369189096e3e0d946
- 2c99939b710c36bb0c3d02e0614d4ab9a84d00ab

Actions #3

Updated by Jeff Lucovsky almost 3 years ago

  • Status changed from In Progress to In Review
Actions #4

Updated by Victor Julien almost 3 years ago

  • Status changed from In Review to Closed
  • Affected Versions 5.0.6 added
Actions #5

Updated by Victor Julien over 2 years ago

  • Priority changed from High to Normal
  • CVE set to 2021-35063
  • Git IDs updated (diff)
  • Severity set to CRITICAL
Actions #6

Updated by Victor Julien over 2 years ago

  • Private changed from Yes to No
Actions

Also available in: Atom PDF