CVE-2019-18625

Priority
Description
An issue was discovered in Suricata 5.0.0. It was possible to bypass/evade
any tcp based signature by faking a closed TCP session using an evil
server. After the TCP SYN packet, it is possible to inject a RST ACK and a
FIN ACK packet with a bad TCP Timestamp option. The client will ignore the
RST ACK and the FIN ACK packets because of the bad TCP Timestamp option.
Both linux and windows client are ignoring the injected packets.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):DNE
More Information

Updated: 2020-01-29 18:59:32 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)