Suricata Incomplete TCP Handshake Detection Bypass

Strike ID:
E18-0o8a1
CVSS:
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
False Positive:
f
Variants:
1
Year:
2018

Description

This strike exploits a content detection bypass in Suricata. Suricata has state dependent connection, and as such will not perform some detection on TCP session which has not completed the TCP handshake and become established. However, many HTTP client applications, such as wget, curl, and some web browsers, will still process data received before the TCP session is established. An attacker could send malicious content during the TCP handshake, before the session is established, and the malicious content would not be processed by Suricata. Successful exploitation would bypass detection by Suricata.

CVE

References