Short Name |
UDP:SNORT-FRAG3-DETECTION |
---|---|
Severity |
High |
Recommended |
No |
Category |
UDP |
Keywords |
Snort frag3 Preprocessor Fragmented IP Packet Detection Evasion |
Release Date |
2015/06/12 |
Update Number |
2504 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Snort's frag3 preprocessor. The vulnerability is caused due to improper processing of IP Options of fragmented IP packets in the vulnerable preprocessor. An attacker may exploit this vulnerability by sending crafted fragmented IP packets to bypass Snort's detection or terminate the Snort process in certain circumstances. In an attack case, the attacker will be successful in delivering a malicious payload to the target system, which is normally recognizable by the Snort IDS, without raising an alert. There will be no discernible difference in behaviour of the target host as the exploitation of this vulnerability results in a detection bypass only. In a special attack case aiming at denial of service, the Snort process will terminate. Thus the IDS functionality will be terminated as a result. All detectable malicious traffic sent to the target protected by the Snort IDS will not be detected until the Snort process is restarted manually.
The frag3 preprocessor in Sourcefire Snort 2.4.3 does not properly reassemble certain fragmented packets with IP options, which allows remote attackers to evade detection of certain attacks, possibly related to IP option lengths.