File: 1627.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (65 lines) | stat: -rw-r--r-- 1,108 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
Rule:

--
Sid:
1627

--
Summary:
This event is generated when packets on the network are using an 
unassigned or reserved IP protocol.

--
Impact:
Possible prelude to system compromise.

--
Detailed Information:
Under normal circumstances IP packets do not use unassigned or reserved 
protocols.

an indicator of unauthorized network use, reconnaisance activity or 
system compromise. These rules may also generate an event due to 
improperly configured network devices.

--
Affected Systems:
	All

--
Attack Scenarios:
The attacker may send specially crafted packets using an unassigned or 
reserved protocol.

--
Ease of Attack:
Simple

--
False Positives:
Research or testing of new protocols may trigger this event.

Novell use protocol 224 for the Cluster heart beat

--
False Negatives:
None Known

--
Corrective Action:
Use a packet filtering device to reject packets using an unknown 
protocol.

--
Contributors:
Original rule writer unknown
Sourcefire Research Team
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

IANA
http://www.iana.org/assignments/protocol-numbers

--