Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html | mailing list |
https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8 | issue tracking third party advisory patch |
https://redmine.openinfosecfoundation.org/issues/2019 | issue tracking third party advisory patch |
http://www.securityfocus.com/bid/97047 | vdb entry |