[Oisf-devel] [COMMIT] OISF branch, master, updated. suricata-2.1beta1-81-g04afcf2
OISF Git
noreply at openinfosecfoundation.org
Tue Sep 23 11:48:25 UTC 2014
This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".
The branch, master has been updated
via 04afcf2717d1d6814a8ac39b5489ef3ce8ff2f0d (commit)
via 0f61264d68fdf69f44fb6f0a0d5a81248157159f (commit)
via 9fd96f531a7babe1c54bc67a5d51825369e230ab (commit)
via 5f4a23deb93b68a97b37ec44810932d52ac6cfad (commit)
from 7cdc57060b6b16417c45468682158ded6b47a091 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit 04afcf2717d1d6814a8ac39b5489ef3ce8ff2f0d
Author: Victor Julien <victor at inliniac.net>
Date: Thu Sep 18 10:13:18 2014 +0200
ssh: convert error message to debug statement
Don't print errors based on traffic issues.
commit 0f61264d68fdf69f44fb6f0a0d5a81248157159f
Author: Eric Leblond <eric at regit.org>
Date: Fri Sep 12 10:02:12 2014 +0200
app-layer-ssh: fix banner parser
Carefully crafted SSH banner could result in parser error.
Signed-off-by: Eric Leblond <eric at regit.org>
commit 9fd96f531a7babe1c54bc67a5d51825369e230ab
Author: Victor Julien <victor at inliniac.net>
Date: Wed Sep 17 14:57:15 2014 +0200
ipv6: convert ext header pointers to const
To prevent accidental writes into the orignal packet buffer, use
const pointers for the extension header pointers used by IPv6. This
will cause compiler warnings in case of writes.
commit 5f4a23deb93b68a97b37ec44810932d52ac6cfad
Author: Victor Julien <victor at inliniac.net>
Date: Wed Sep 17 14:26:27 2014 +0200
ipv6: RH extension header parsing issue
A logic error in the IPv6 Routing header parsing caused accidental
updating of the original packet buffer. The calculated extension
header lenght was set to the length field of the routing header,
causing it to be wrong.
This has 2 consequences:
1. defrag failure. As the now modified payload was used in defrag,
the decoding of the reassembled packet now contained a broken length
field for the routing header. This would lead to decoding failure.
The potential here is evasion, although it would trigger:
[1:2200014:1] SURICATA IPv6 truncated extension header
2. in IPS mode, especially the AF_PACKET mode, the modified and now
broken packet would be transmitted on the wire. It's likely that
end hosts and/or routers would reject this packet.
NFQ based IPS mode would be less affected, as it 'verdicts' based on
the packet handle. In case of replacing the packet (replace keyword
or stream normalization) it could broadcast the bad packet.
Additionally, the RH Type 0 address parsing was also broken. It too
would modify the original packet. As the result of this code was not
used anywhere else in the engine, this code is now disabled.
Reported-By: Rafael Schaefer <rschaefer at ernw.de>
-----------------------------------------------------------------------
Summary of changes:
src/app-layer-ssh.c | 94 +++++++++++++++++++++++++++++++++++++++++++++++++++
src/decode-ipv6.c | 8 ++---
src/decode-ipv6.h | 16 +++++----
src/defrag.c | 9 ++---
4 files changed, 112 insertions(+), 15 deletions(-)
hooks/post-receive
--
OISF
More information about the Oisf-devel
mailing list