Guest

Cisco Security

Cisco Security

TCP winscale option detected when not expected

 
Signature ID: 1330/20
Original Release:S339
Release:S739 (download)
Original Release Date:2008 July 01
Latest Release Date:2013 September 04
Default Enabled:True
Default Retired:False
Alarm Severity:Informational
Fidelity:100 

Description

This signature triggers when a TCP packet with SYN and ACK flags set has window scale option but the SYN packet did not. If event actions are either not set or event actions are set to modify packet inline or if the signature status is set to disabled the window scale option will be cleared.This signature functions in promiscuous mode.

Recommended Filter

There are no suggested filters.

Benign Triggers

Some 1330 signatures will trigger during normal network traffic.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
1160TCP Segment Manipulation22008 October 28 14:03 GMT
14071Cisco Content Switching Module TCP Packet Handling Denial of Service Vulnerability17.8/6.42007 September 05 16:29 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield