Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 223217 (CVE-2008-1804) - <net-analyzer/snort-2.8.1 Snort IP Fragment TTL Evasion Vulnerability (CVE-2008-1804)
Summary: <net-analyzer/snort-2.8.1 Snort IP Fragment TTL Evasion Vulnerability (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2008-1804
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://labs.idefense.com/intelligence...
Whiteboard: B4? [noglsa]
Keywords:
Depends on: 198205 245752
Blocks:
  Show dependency tree
 
Reported: 2008-05-22 14:59 UTC by Robert Buchholz (RETIRED)
Modified: 2010-03-06 16:22 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-05-22 14:59:22 UTC
iDefense writes:
Remote exploitation of a design error vulnerability in Snort, as
included in various vendors' operating system distributions, could
allow an attacker to bypass filter rules.

Due to a design error vulnerability, Snort does not properly reassemble
fragmented IP packets. When receiving incoming fragments, Snort checks
the Time To Live (TTL) value of the fragment, and compares it to the
TTL of the initial fragment. If the difference between the initial
fragment and the following fragments is more than a configured amount,
the fragments will be silently discard. This results in valid traffic
not being examined and/or filtered by Snort.

III. ANALYSIS

Exploitation of this vulnerability allows an attacker to bypass all
Snort rules. In order to exploit this vulnerability, an attacker would
have to fragment IP packets destined for a targeted host, ensuring that
the TTL difference is greater than the configured maximum. By default,
the maximum difference is 5.

If an attacker is successful, all fragments with invalid TTL differences
will be dropped. No rules will be applied to them.

IV. DETECTION

iDefense has confirmed the existence of this vulnerability in Snort 2.8
and 2.6. Snort 2.4 is not vulnerable.

V. WORKAROUND

In the snort.conf file, set the ttl_limit configuration value to 255 as
shown below.

  preprocessor frag3_engine: ttl_limit 255

This will set the allowable difference to the maximum possible value,
and prevent fragments from being dropped.

VI. VENDOR RESPONSE

Sourcefire has addressed this vulnerability by releasing version 2.8.1
of Snort. For more information consult their change log and source
differences at the following URLs.

http://cvs.snort.org/viewcvs.cgi/snort/ChangeLog?rev=1.534.2.11

http://cvs.snort.org/viewcvs.cgi/snort/src/preprocessors/spp_frag3.c.diff?r1=text&tr1=1.46.2.4&r2=text&tr2=1.46.2.5&diff_format=h
Comment 2 Matt 2008-06-17 22:36:27 UTC
see Bug #198205 , that snort-version (2.8.2) works for me

Cheers
Comment 3 Jason Wallace 2008-11-05 21:02:07 UTC
bug #245752 should resolve this issue
Comment 4 Jason Wallace 2009-04-15 19:05:02 UTC
There is a new ebuild for snort-2.8.4 at the following bug...
 
bug#266288

This also fixes this bug. Please close this bug and..

Bug#198205
Bug#245752
Comment 5 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-04-15 20:24:30 UTC
(In reply to comment #4)
> Please close this bug...
>

Please note that Security bugs are needed for more than just bumping purposes and are _not_ closed in cases such as this.
Comment 6 Stefan Behte (RETIRED) gentoo-dev Security 2009-11-07 06:45:58 UTC
Ready to vote, I vote: NO.
Comment 7 Alex Legler (RETIRED) archtester gentoo-dev Security 2010-03-06 16:22:57 UTC
NO too. Closing noglsa.