Guest

Cisco Security

Cisco Security

TCP option data after EOL option

 
Signature ID: 1306/6
Original Release:S339
Release:S675 (download)
Original Release Date:2008 July 01
Latest Release Date:2012 October 23
Default Enabled:True
Default Retired:False
Alarm Severity:Informational
Fidelity:100 

Description

This signature fires when TCP options occur after the end of options indicator in the TCP options list.All 1306 Sigs will fire an alert in inline mode and will not function in promiscuous mode.

Recommended Filter

There are no suggested filters.

Benign Triggers

TCP options may occur after the end of options list indicator in network traffic but this behavior is not correct. This signature allows users to enforce policies related to this option. In addition, if any problems with option parsing are found on end hosts, users can use this signature to modify or deny offending packets.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
1160TCP Segment Manipulation22008 October 28 14:03 GMT
14071Cisco Content Switching Module TCP Packet Handling Denial of Service Vulnerability17.8/6.42007 September 05 16:29 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield