File: 111-17.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (64 lines) | stat: -rw-r--r-- 1,217 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
Rule: 

--
Sid: 
111-17

-- 
Summary: 
This event is generated when the pre-processor stream4
detects network traffic that may constitute an attack.

-- 
Impact: 
Unknown. This may be an IDS evasion attempt.

--
Detailed Information:
The pre-processor stream4 has detected a TCP session that contains
retransimitted data without the necessary retransmission request. This
may be an attempt to evade any monitoring IDS.

It may be possible for an attacker to send multiple small packets to a
host then disguise an actual attack in a retransmitted packet to that
same host.

--
Affected Systems:
	All systems

--
Attack Scenarios: 
An attacker could cause a host to send multiple acknowledgement packets
then supply one large malicious packet to the host disguised as a
retransmission of data.

-- 
Ease of Attack: 
Difficult.

-- 
False Positives:
None Known.

--
False Negatives:
None Known.

-- 

Corrective Action:
Check the target host for signs of compromise.

Ensure the system is up to date with any appropriate vendor supplied patches.

--
Contributors:
Martin Roesch <roesch@sourcefire.com>
Sourcefire Vulnerability Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--