This signature fires when one or more TCP segments in the same stream overwrite data from a one or more segments located earlier in the stream. This may indicate an attempt to hide an attack. Overwriting TCP segments do not normally occur and should be treated with suspicion.This signature will function in both promiscuous and in-line modes.
No recommended filters.
This signature may trigger upon analyzing traffic assigned to the same virtual sensor when the sensor is configured to monitor 2 or more networks, and the tcp connection is crossing 2 or more networks. If the sensor sees the same traffic twice within the same virtual sensor, this signature may fire.
This signature may fire on traffic seen twice within the same virtual sensor when such traffic crosses multiple networks where an intermediate device may modify the packets (for example: a firewall or proxy server)
Prior to version 6.0(1), the signature may fire on dual processor systems (running in dual thread mode) when there are no segment overwrites seen in network traffic. This is documented in Cisco defect ID CSCsg23774.
LEGAL DISCLAIMER THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.