📄 522.txt
字号:
Rule: --Sid:522--Summary:This event is generated when an IPv4 fragment of dubiously small nature was detected.--Impact:Many IDSes are known to have issues regarding the reassembly of IPfragments, and could miss an attack carried over such means. Firewallssuffer from the same issues, and can be tricked into allowing packetsthrough that should normally be rejected. Furthermore, there is a smallhistory of OS issues related to unorthodox fragmentation.--Detailed Information:IPv4 manages to adapt to various link layer protocols on a route via thefragmentation mechanism outlined in its RFC. A router connecting twocarrying media of varying MTU (Maximum Transmission Unit) can fragmentpackets of size too large to transmit on one wire before dispatch. Whendatagrams stay within one MTU, the maximum packet sizes possible can beused without fragmentation, thus pairing flexibility with efficiency.Historically, handling of fragmentation has been less than stellar inboth IP stacks and the IDS systems designed to protect them. While thelimited number of attacks based on fragmentation are easily picked up byanomaly- or signature-based system, IDSes which fail to properlyreassemble fragments can miss any attack which is so fragmented.Firewalls have often proved susceptible to fragmented TCP or UDPheaders, allowing traffic which should have been filtered to passthrough.--Affected Systems:Any IDS/firewall lacking proper IPv4 fragment reassembly.--Attack Scenarios:An attacker may pass a fragment containing a TCP/UDP header which isallowed to pass through a firewall, then follow this up with a fragmentwhich overwrites the previous headers, but is allowed due to poorconnection tracking.An attacker may fragment an exploit, so that it is not detected by IPSnor filtered by IPS products.--Ease of Attack:Tools have been written to trivially fragment traffic; Dug Song'sfragrouter program is a well-known example.--False Positives:It is unlikely that such a fragment would be seen in standard use ofIPv4; while the last fragment in a series is typically smaller than theothers, this signature explicilty matches the More Fragments bit.Nonetheless, a pedantic reading of the IPv4 RFC allows this, so long asthe data length is a multiple of 8.--False Negatives:Attacks may still be fragmented into larger chunks.--Corrective Action:None--Contributors:Original Rule Writer UnknownSourcefire Research TeamNigel Houghton <nigel.houghton@sourcefire.com>Snort documentation contributed by Nick Black, Reflex Security <dank@reflexsecurity.com>-- Additional References:IPv4 RFC:http://www.faqs.org/rfcs/rfc791.html--
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -