[Oisf-devel] [COMMIT] OISF branch, master-2.0.x, updated. suricata-2.0.3-12-g8cf0736
OISF Git
noreply at openinfosecfoundation.org
Tue Sep 23 11:01:06 UTC 2014
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".
The branch, master-2.0.x has been updated
via 8cf073604603c2e6559c7a7b1f69ec7e93b7c6d4 (commit)
via cd03c0029756fa05ac128587075792192f90afbe (commit)
via 8ec28dea16080c77828412d6de01018dabc7b7c3 (commit)
via 48499b17392ad3a699b4642ee43fe7ace555de79 (commit)
from a3bd19e18a33a748618633dde4aff767373371d9 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit 8cf073604603c2e6559c7a7b1f69ec7e93b7c6d4
Author: Victor Julien <victor at inliniac.net>
Date: Tue Sep 23 12:16:15 2014 +0200
Update changelog for 2.0.4
commit cd03c0029756fa05ac128587075792192f90afbe
Author: Victor Julien <victor at inliniac.net>
Date: Thu Sep 18 10:13:18 2014 +0200
ssh: convert error message to debug statement
Don't print errors based on traffic issues.
commit 8ec28dea16080c77828412d6de01018dabc7b7c3
Author: Eric Leblond <eric at regit.org>
Date: Fri Sep 12 10:02:12 2014 +0200
app-layer-ssh: fix banner parser
Carefully crafted SSH banner could result in parser error.
CVE 2014-6603
Signed-off-by: Eric Leblond <eric at regit.org>
Reported-By: Steffen Bauch
commit 48499b17392ad3a699b4642ee43fe7ace555de79
Author: Victor Julien <victor at inliniac.net>
Date: Wed Sep 17 14:26:27 2014 +0200
ipv6: RH extension header parsing issue
A logic error in the IPv6 Routing header parsing caused accidental
updating of the original packet buffer. The calculated extension
header lenght was set to the length field of the routing header,
causing it to be wrong.
This has 2 consequences:
1. defrag failure. As the now modified payload was used in defrag,
the decoding of the reassembled packet now contained a broken length
field for the routing header. This would lead to decoding failure.
The potential here is evasion, although it would trigger:
[1:2200014:1] SURICATA IPv6 truncated extension header
2. in IPS mode, especially the AF_PACKET mode, the modified and now
broken packet would be transmitted on the wire. It's likely that
end hosts and/or routers would reject this packet.
NFQ based IPS mode would be less affected, as it 'verdicts' based on
the packet handle. In case of replacing the packet (replace keyword
or stream normalization) it could broadcast the bad packet.
Additionally, the RH Type 0 address parsing was also broken. It too
would modify the original packet. As the result of this code was not
used anywhere else in the engine, this code is now disabled.
Reported-By: Rafael Schaefer <rschaefer at ernw.de>
-----------------------------------------------------------------------
Summary of changes:
ChangeLog | 9 +++++
src/app-layer-ssh.c | 94 +++++++++++++++++++++++++++++++++++++++++++++++++++
src/decode-ipv6.c | 8 ++---
src/decode-ipv6.h | 2 ++
4 files changed, 109 insertions(+), 4 deletions(-)
hooks/post-receive
--
OISF
More information about the Oisf-devel
mailing list