Guest

Cisco Security

Cisco Security

MODBUS Response Header Length TCP Segment Size Mismatch

 
Signature ID: 1856/0
Original Release:S712
Release:S712 (download)
Original Release Date:2013 April 29
Latest Release Date:2013 April 29
Default Enabled:False
Default Retired:True
Alarm Severity:Medium
Fidelity:90 

Description

Checks that each TCP segment contains exactly one MODBUS PDU by ensuring that the TCP segment length and the MODBUS PDU length values are consistent with a single, complete PDU as the TCP payload. Frequent violation this policy can indicated attempts by an attacker to evade IPS protections or identify weaknesses in vulnerable implementations.You are entitled to use this signature only if you have purchased an IPS SCADA Signature License

Recommended Filter

There are no suggested filters.

Benign Triggers

MODBUS/TCP implementations that allow non-conformant behavior of multiple MODBUS/TCP PDUs in a single TCP segment or a single MODBUS/TCP PDU segmented across multiple TCP segments will trigger.

IntelliShield Alerts

IntelliShield ID Headline VersionCVSS ScoreLast Published
22606MODBUS/TCP Protocol Multiple Register Messages Processing Denial of Service Vulnerability12011 October 25 14:40 GMT

Download

To download this and other IPS update files, please go to Cisco Secure Software Download.

LEGAL DISCLAIMER
THE INFORMATION ON THIS PAGE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION CONTAINED HEREIN, OR MATERIALS LINKED FROM THE DOCUMENT, IS AT YOUR OWN RISK. INFORMATION IN THIS DOCUMENT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
Powered by  IntelliShield