Short Name |
ICMP:EXPLOIT:DIFF-LEN-IN-RESP |
---|---|
Severity |
High |
Recommended |
No |
Category |
ICMP |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly triggers when it detects an ICMP echo reply retransmission (for example, with the same ID and sequence numbers) with different data length. This can indicate data tunneling over ICMP.
An ECHO RESPONSE message received by a client that matches the ID and sequence number of a transmitted ECHO datagram, but contains a different size payload, constitutes a protocol anomaly. This condition could indicate a network configuration error, or that unauthorized "tunneling" activity is occurring.