[Oisf-devel] FPs with IPv4 more Fragment flag on suricata v121

rmkml rmkml at yahoo.fr
Tue Jan 24 21:10:46 UTC 2012


Hi Peter,
You are right, I have missed these rules: (partial/special emerging threats with my pcap example)

alert udp $EXTERNAL_NET any -> $HOME_NET 123 (msg:"GPL EXPLOIT ntpdx overflow attempt"; dsize:>128; classtype:attempted-admin; reference:bugtraq,2540; reference:cve,2001-0414; sid:2100312; rev:7;)
alert udp $EXTERNAL_NET any -> $HOME_NET 162 (msg:"GPL SNMP SNMP trap Format String detected"; content:"%s"; classtype:attempted-recon; reference:bugtraq,16267; reference:cve,2006-0250; 
reference:url,www.osvdb.org/displayvuln.php?osvdb_id=22493; sid:100000227; rev:2;)
alert udp $EXTERNAL_NET any -> $HOME_NET 27777 (msg:"GPL GAMES Amp II 3D Game Server Denial of Service Empty UDP Packet"; dsize:0; classtype:attempted-dos; reference:bugtraq,12192; sid:100000104; rev:2;)
alert udp $EXTERNAL_NET any -> $HOME_NET 5060 (msg:"GPL EXPLOIT EXPLOIT SIP UDP spoof attempt"; content:"|3B|branch|3D 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 0A|"; nocase; classtype:attempted-dos; 
reference:bugtraq,14174; reference:cve,2005-2182; reference:url,www.osvdb.org/displayvuln.php?osvdb_id=17838; sid:100000180; rev:1;)
alert udp $EXTERNAL_NET any -> $HOME_NET 7649 (msg:"GPL GAMES Breed Game Server Denial of Service Empty UDP Packet"; dsize:0; classtype:attempted-dos; reference:bugtraq,12262; sid:100000103; rev:2;)

can you retest with all rules please?
Regards
Rmkml



On Tue, 24 Jan 2012, Peter Manev wrote:

> Hi,
> Suricata 1.2.1 behaves as expected - there is no alerts fired.
> If you would like, you can share your yaml privately for further investigation.
> 
> Thanks for your help
> 
> On Tue, Jan 24, 2012 at 12:45 AM, rmkml <rmkml at yahoo.fr> wrote:
>       Hi,
>       Im curious with this joigned pcap file on suricata v1.2.1, FP signatures example:
>        alert udp any any -> any 162 (msg:"suricata snmp trap udp"; dsize:0; classtype:attempted-recon; sid:9104192; rev:1;)
>       another FP signature with same pcap:
>        alert udp any any -> any 5060 (msg:"suricata sip udp "; dsize:0; classtype:misc-attack; sid:9104843; rev:1; )
>       ...
>       Anyone check/confirm please? if yes Im open a new redmine ticket.
>       No alert with snort.
>
>       Tshark partial output:
>       ...
>       Internet Protocol Version 4, Src: 172.20.2.131 (172.20.2.131), Dst: 172.20.2.51 (172.20.2.51)
>        Version: 4
>        Header length: 20 bytes
>        Differentiated Services Field: 0x00 (DSCP 0x00: Default; ECN: 0x00: Not-ECT (Not ECN-Capable Transport))
>        Total Length: 1500
>        Identification: 0x7709 (30473)
>        Flags: 0x01 (More Fragments)
>           0... .... = Reserved bit: Not set
>           .0.. .... = Don't fragment: Not set
>           ..1. .... = More fragments: Set
>        Fragment offset: 0
>        Time to live: 128
>        Protocol: UDP (17)
>        Header checksum: 0x4129 [correct]
>        Source: 172.20.2.131 (172.20.2.131)
>        Destination: 172.20.2.51 (172.20.2.51)
>       Data (1480 bytes)
>       ...
>
>       Happy Detect.
>       Regards
>       Rmkml
>
>       http://twitter.com/rmkml
>       _______________________________________________
>       Oisf-devel mailing list
>       Oisf-devel at openinfosecfoundation.org
>       http://lists.openinfosecfoundation.org/mailman/listinfo/oisf-devel
> 
> 
> 
> 
> --
> Peter Manev
> 
>


More information about the Oisf-devel mailing list