DVB-Cube BETA <<< Das deutsche PC und DVB-Forum >>>

PC-Ecke => # Security Center => Software (PC-Sicherheit) => Thema gestartet von: SiLæncer am 14 April, 2007, 20:07

Titel: Network-Intrusion-Detection-System (NIDS) Software diverses
Beitrag von: SiLæncer am 14 April, 2007, 20:07
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.

Kismet identifies networks by passively collecting packets and detecting standard named networks, detecting (and given time, decloaking) hidden networks, and infering the presence of nonbeaconing networks via data traffic.

http://www.kismetwireless.net/
Titel: kismet 2010-07-R1
Beitrag von: SiLæncer am 16 September, 2010, 17:50
Zitat
Kismet-2010-07-R1 released, at the usual spot. Re-architected and bug-fixed IPC subsystem, hidedata option to prevent any processing of data frames, general internal bugfixes and improvements, ruby API and examples, zero-priv drone-only options.

http://www.kismetwireless.net/
Titel: Kismet-2013-03-R1b
Beitrag von: SiLæncer am 22 Juni, 2013, 22:00
Zitat
Mon Apr 08 2013 - Kismet-2013-03-R1b released. Somehow the latest configure script didn't get into the R1 release so it blew up on libnl1 detection; No code changes, no package changes.

Wed Mar 27 2013 - Kismet-2013-03-R1 released! While this does not have major new features (phy-neutral is still in development) it includes a long list of bugfixes, including better ncurses color support, radiotap fixes, better interface control when setting channels, memory leak fixes, better packaging for distros, and various other quirks. At the usual download page

Thu Dec 06 2012 - Busy busy busy. Two new Android utilies now up - rfmon with a USB NIC, capturing to pcap, no root required, in Android PCAP Capture. To go with that, an easy way to upload pcap files from Android to CloudShark, a web-based implementation of Wireshark: CloudShark Uploader

Mon Jul 23 2012 - While phy-neutral is finishing up, added Ubuntu 12 packages for Kismet 2011-03

Thu Jul 05 2012 - Kismet moving to Git source control. Subversion is moved to code-old/svn (details on the download page) and the old SVN repository is disabled. Git checkouts at https://www.kismetwireless.net/kismet.git

https://kismetwireless.net/
Titel: Suricata 1.4.5 / 2.0 Beta 1
Beitrag von: SiLæncer am 06 August, 2013, 11:00
(https://www.heise.de/software/screenshots/t112868.jpg)
Network-Intrusion-Detection-System (NIDS), das den Netzwerkverkehr überwacht und versucht, verdächtige Aktivitäten, Pakete und Verbindungen zu erkennen; wird eine solche erkannt, bietet das Programm dem Benutzer weitere Optionen wie Blockieren, Umgehen oder Reinigen an.

Lizenz: Open Source

Whats new: >>

Suricata 2.0 Beta 1:

New features:

· Luajit flow vars and flow ints support
· DNS parser, logger and keyword support
· deflate support for HTTP response bodies

Improvements:

· update to libhtp 0.5
· improved gzip support for HTTP response bodies
· redesigned transaction handling, improving both accuracy and performance
· redesigned CUDA support
· Be sure to always apply verdict to NFQ packet
· stream engine: SACK allocs should adhere to memcap
· stream: deal with multiple different SYN/ACK’s better
· stream: Randomize stream chunk size for raw stream inspection
· Introduce per stream thread ssn pool
· pass” IP-only rules should bypass detection engine after matching
· Generate error if bpf is used in IPS mode
· Add support for batch verdicts in NFQ
· Update Doxygen config
· Improve libnss detection

Fixes:

· Fix a FP on rules looking for port 0 and fragments
· OS X unix socket build fixed
· bytetest, bytejump and byteextract negative offset failure
· Fix fast.log formatting issues
· Invalidate negative depth
· Fixed accuracy issues with relative pcre matching
· Fix deadlock in flowvar capture code
· Improved accuracy of file_data keyword
· Fix af-packet ips mode rule processing bug
· stream: fix injecting pseudo packet too soon leading to FP

Suricata 1.4.5:

· ipv6 extension header parsing issue causing Suricata to hang
· icmp_seq and icmp_id keyword with icmpv6 traffic FP & FN

http://suricata-ids.org/
Titel: Suricata 2.0 RC 1
Beitrag von: SiLæncer am 21 Februar, 2014, 21:00
Whats new: >>

Notable changes:

unified JSON output for almost all log types (eve-log). Written by Tom Decanio of nPulse Technologies
QinQ VLAN handling
Alerting over PCIe bus (Tilera only), by Ken Steel of Tilera
Add –set commandline option to override any YAML option, by Jason Ish of Emulex
Various scalability improvements, clean ups and fixes by Ken Steel of Tilera
ICMPv6 handling improvements by Jason Ish of Emulex
memcaps for DNS and HTTP handling were added
Several fixes and improvements of AF_PACKET and PF_RING
NSM runmode, where detection engine is disabled. Development supported by nPulse Technologies

Fixes:

App layer registration cleanup – Support specifying same alproto names in rules for different ip protocols
TLS JSON output
case insensitive fileext match
JSON output for alerts
QinQ tag flow support
clean up output
Override conf parameters
united output
Suricata should compile with -Werror
memcap for http inside suricata
dns memcap
stream: configurable segment pools
Add a decoder.QinQ stats in stats.log
Detect icmpv6 on ipv4
http events alert multiple times
VLAN decoder stats with AF Packet get written to the first thread only – stats.log
memory leak in http buffers at shutdown
format string issues with size_t + qa not catching them
Segmentation fault in 2.0beta2: Custom HTTP log segmentation fault
radix tree lookups are not thread safe
CUDA 5.5 doesn’t compile with 2.0 beta 2
Err loading rules with variables that contain negated content.
segfault – 2.0dev (rev 6e389a1)
100% CPU utilization with suricata 2.0 beta2+
af-packet vlan handling is broken
stats.log not incrementing decoder.ipv4/6 stats when reading in QinQ packets
vlan tagged fragmentation
Git compile fails on Ubuntu Lucid
flow timeout causes decoders to run on pseudo packets

http://suricata-ids.org/
Titel: Suricata 2.0 RC 2
Beitrag von: SiLæncer am 10 März, 2014, 21:00
Whats new: >>

Notable changes

eve-log is now enabled by default
SSH parser is re-enabled
SSH logging was added to ‘eve-log’
bundled libhtp was updated to 0.5.10

Fixes:

Add VLAN tag ID to all outputs
Add QinQ tag ID to all outputs
Introduce SSH log
app-layer protocols http memcap – info in verbose mode (-v)
restore SSH protocol detection and parser
fp: rule with ports matching on portless proto
default config generates rule warnings and errors
1.4.6: conf_filename not checked before use
SMTP: move depends on uninitialised value
FTP: Memory Leak
TLS-Handshake: Uninitialized value
HTTP: Memory Leak
suricata.yaml config parameter – segfault
PF_RING vlan handling
Can have the same Pattern ID (pid) for the same pattern but different case flags
capture stats at exit incorrect
tls-events.rules file missing
nfq: exit stats not working
segv with pfring/afpacket and eve-log enabled
crash in eve-log
ipfw build broken

http://suricata-ids.org/
Titel: Suricata 2.0 RC 3
Beitrag von: SiLæncer am 23 März, 2014, 08:00
Whats new: >>

Fixes:

Bug #1127: logstash & suricata parsing issue
Bug #1128: Segmentation fault – live rule reload
Bug #1129: pfring cluster & ring initialization
Bug #1130: af-packet flow balancing problems
Bug #1131: eve-log: missing user agent reported inconsistently
Bug #1133: eve-log: http depends on regular http log
Bug #1135: 2.0rc2 release doesn’t set optimization flag on GCC
Bug #1138: alert fastlog drop info missing

http://suricata-ids.org/
Titel: Suricata 2.0.1 RC 1
Beitrag von: SiLæncer am 16 Mai, 2014, 05:30
Whats new: >>

Notable changes:

OpenSSL Heartbleed detection. Thanks to Pierre Chifflier and Will Metcalf
Fixed Unix Socket runmode
Fixed AF_PACKET IPS support

All closed tickets:

Feature #1157: Always create pid file if –pidfile command line option is provided
Feature #1173: tls: OpenSSL heartbleed detection
Bug #978: clean up app layer parser thread local storage
Bug #1064: Lack of Thread Deinitialization For Decoder Modules
Bug #1101: Segmentation in AppLayerParserGetTxCnt
Bug #1136: negated app-layer-protocol FP on multi-TX flows
Bug #1141: dns response parsing issue
Bug #1142: dns tcp toclient protocol detection
Bug #1143: tls protocol detection in case of tls-alert
Bug #1144: icmpv6: unknown type events for MLD_* types
Bug #1145: ipv6: support PAD1 in DST/HOP extension hdr
Bug #1146: tls: event on ‘new session ticket’ in handshake
Bug #1159: Possible memory exhaustion when an invalid bpf-filter is used with AF_PACKET
Bug #1160: Pcaps submitted via Unix Socket do not finish processing in Suricata 2
Bug #1161: eve: src and dst mixed up in some cases
Bug #1162: proto-detect: make sure probing parsers for all registered ports are run
Bug #1163: HTP Segfault
Bug #1165: af_packet – one thread consistently not working
Bug #1170: rohash: CID 1197756: Bad bit shift operation (BAD_SHIFT)
Bug #1176: AF_PACKET IPS mode is broken in 2.0
Bug #1177: eve log do not show action ‘dropped’ just ‘allowed’
Bug #1180: Possible problem in stream tracking

http://suricata-ids.org/
Titel: Suricata 2.0.1
Beitrag von: SiLæncer am 23 Mai, 2014, 05:30
Whats new: >>

Notable changes:

OpenSSL Heartbleed detection. Thanks to Pierre Chifflier and Will Metcalf
Fixed Unix Socket runmode
Fixed AF_PACKET IPS support

All closed tickets:

Feature #1157: Always create pid file if –pidfile command line option is provided
Feature #1173: tls: OpenSSL heartbleed detection
Bug #978: clean up app layer parser thread local storage
Bug #1064: Lack of Thread Deinitialization For Decoder Modules
Bug #1101: Segmentation in AppLayerParserGetTxCnt
Bug #1136: negated app-layer-protocol FP on multi-TX flows
Bug #1141: dns response parsing issue
Bug #1142: dns tcp toclient protocol detection
Bug #1143: tls protocol detection in case of tls-alert
Bug #1144: icmpv6: unknown type events for MLD_* types
Bug #1145: ipv6: support PAD1 in DST/HOP extension hdr
Bug #1146: tls: event on ‘new session ticket’ in handshake
Bug #1159: Possible memory exhaustion when an invalid bpf-filter is used with AF_PACKET
Bug #1160: Pcaps submitted via Unix Socket do not finish processing in Suricata 2
Bug #1161: eve: src and dst mixed up in some cases
Bug #1162: proto-detect: make sure probing parsers for all registered ports are run
Bug #1163: HTP Segfault
Bug #1165: af_packet – one thread consistently not working
Bug #1170: rohash: CID 1197756: Bad bit shift operation (BAD_SHIFT)
Bug #1176: AF_PACKET IPS mode is broken in 2.0
Bug #1177: eve log do not show action ‘dropped’ just ‘allowed’
Bug #1180: Possible problem in stream tracking

http://suricata-ids.org/
Titel: Suricata 2.0.2
Beitrag von: SiLæncer am 11 Juli, 2014, 13:47
Whats new: >>

Notable changes:

IP defrag issue leading to evasion. Bug discovered by Antonios Atlasis working with ERNW GmbH
Support for NFLOG as a capture method. Nice work by Giuseppe Longo
DNS TXT parsing and logging. Funded by Emerging Threats
Log rotation through SIGHUP. Created by Jason Ish of Endace/Emulex

All closed tickets:

Feature #781: IDS using NFLOG iptables target
Feature #1158: Parser DNS TXT data parsing and logging
Feature #1197: liblua support
Feature #1200: sighup for log rotation
Bug #1098: http_raw_uri with relative pcre parsing issue
Bug #1175: unix socket: valgrind warning
Bug #1189: abort() in 2.0dev (rev 6fbb955) with pf_ring 5.6.3
Bug #1195: nflog: cppcheck reports memleaks
Bug #1206: ZC pf_ring not working with Suricata 2.0.1 (or latest git)
Bug #1211: defrag issue
Bug #1212: core dump (after a while) when app-layer.protocols.http.enabled = yes
Bug #1214: Global Thresholds (sig_id 0, gid_id 0) not applied correctly if a signature has event vars
Bug #1217: Segfault in unix-manager.c line 529 when using –unix-socket and sending pcap files to be analized via socket

http://suricata-ids.org/
Titel: Suricata 2.0.3
Beitrag von: SiLæncer am 31 August, 2014, 18:00
Whats new: >>

Changes

Bug #1236: fix potential crash in http parsing
Bug #1244: ipv6 defrag issue
Bug #1238: Possible evasion in stream-tcp-reassemble.c
Bug #1221: lowercase conversion table missing last value
Support #1207: Cannot compile on CentOS 5 x64 with –enable-profiling
Updated bundled libhtp to 0.5.15

http://suricata-ids.org/
Titel: Suricata 2.0.4 / 2.1 Beta 1
Beitrag von: SiLæncer am 07 Oktober, 2014, 19:00
Whats new: >>

2.0.4:

Bug #1276: ipv6 defrag issue with routing headers
Bug #1278: ssh banner parser issue
Bug #1254: sig parsing crash on malformed rev keyword
Bug #1267: issue with ipv6 logging
Bug #1273: Lua – http.request_line not working
Bug #1284: AF_PACKET IPS mode not logging drops and stream inline issue



2.1 Beta 1:

New Features:

Feature #1248: flow/connection logging
Feature #1155 & #1208: Log packet payloads in eve alerts

Improvements:

Optimization #1039: Packetpool should be a stack
Optimization #1241: pcap recording: record per thread
Feature #1258: json: include HTTP info with Alert output
AC matcher start up optimizations
BM matcher runtime optimizations

Removals:

pcapinfo’ output was removed. Suriwire now works with the JSON ‘eve’ output

http://suricata-ids.org/
Titel: Suricata 2.0.5
Beitrag von: SiLæncer am 17 Dezember, 2014, 21:00
Whats new: >>

Bug #1190: http_header keyword not matching when SYN|ACK and ACK missing
Bug #1246: EVE output Unix domain socket not working
Bug #1272: Segfault in libhtp 0.5.15
Bug #1298: Filestore keyword parsing issue (2.0.x)
Bug #1303: improve stream 'bad window update' detection
Bug #1304: improve stream handling of back SACK values
Bug #1305: fix tcp session reuse for ssh/ssl sessions
Bug #1307: byte_extract, within combination not working (2.0.x)
Bug #1326: pcre pkt/flowvar capture broken for non-relative matches
Bug #1329: Invalid rule being processed and loaded.
Bug #1330: Flow memuse bookkeeping error (2.0.x)

http://suricata-ids.org/
Titel: Suricata 2.1 Beta 2
Beitrag von: SiLæncer am 05 Januar, 2015, 06:30
Changelog
New Features:

Feature #549: Extract file attachments from emails
Feature #1312: Lua output support
Feature #899: MPLS over Ethernet support
Feature #383: Stream logging

Improvements:

Feature #1263: Lua: Access to Stream Payloads
Feature #1264: Lua: access to TCP quad / Flow Tuple
Feature #707: ip reputation files – network range inclusion availability (cidr)

Bugs:

Bug #1048: PF_RING/DNA config – suricata.yaml
Bug #1230: byte_extract, within combination not working
Bug #1257: Flow switch is missing from the eve-log section in suricata.yaml
Bug #1259: AF_PACKET IPS is broken in 2.1beta1
Bug #1260: flow logging at shutdown broken
Bug #1279: BUG: NULL pointer dereference when suricata was debug mode.
Bug #1280: BUG: IPv6 address vars issue
Bug #1285: Lua – http.request_line not working (2.1)
Bug #1287: Lua Output has dependency on eve-log:http
Bug #1288: Filestore keyword in wrong place will cause entire rule not to trigger
Bug #1294: Configure doesn’t use –with-libpcap-libraries when testing PF_RING library
Bug #1301: suricata yaml – PF_RING load balance per hash option
Bug #1308: http_header keyword not matching when SYN|ACK and ACK missing (master)
Bug #1311: EVE output Unix domain socket not working (2.1)
[close]

http://suricata-ids.org/
Titel: Suricata 2.0.6
Beitrag von: SiLæncer am 15 Januar, 2015, 21:00
Whats new: >>

Bug #1364: evasion issues
Bug #1337: output-json: duplicate logging
Bug #1325: tls detection leads to tcp stream reassembly sequence gaps (IPS)
Bug #1192: Suricata does not compile on OS X/Clang due to redefinition of string functions
Bug #1183: pcap: cppcheck warning

http://suricata-ids.org/
Titel: Suricata 2.1 Beta 3
Beitrag von: SiLæncer am 19 Februar, 2015, 19:00
Changelog
Bug #977: WARNING on empty rules file is fatal (should not be)
Bug #1184: pfring: cppcheck warnings
Bug #1321: Flow memuse bookkeeping error
Bug #1327: pcre pkt/flowvar capture broken for non-relative matches (master)
Bug #1332: cppcheck: ioctl
Bug #1336: modbus: CID 1257762: Logically dead code (DEADCODE)
Bug #1351: output-json: duplicate logging (2.1.x)
Bug #1354: coredumps on quitting on OpenBSD
Bug #1355: Bus error when reading pcap-file on OpenBSD
Bug #1363: Suricata does not compile on OS X/Clang due to redefinition of string functions (2.1.x)
Bug #1365: evasion issues (2.1.x)
Feature #1261: Request for Additional Lua Capabilities
Feature #1309: Lua support for Stats output
Feature #1310: Modbus parsing and matching
Feature #1317: Lua: Indicator for end of flow
Feature #1333: unix-socket: allow (easier) non-root usage
Optimization #1339: flow timeout optimization
Optimization #1339: flow timeout optimization
Optimization #1371: mpm optimization
[close]

http://suricata-ids.org/
Titel: Suricata 2.0.8 & 2.1 Beta 4
Beitrag von: SiLæncer am 13 Mai, 2015, 22:00
2.0.8

Whats new: >>

Changes

Bug #1450: tls parsing issue
Bug #1460: pcap parsing issue
Bug #1461: potential deadlock
Bug #1404: Alert-Debuglog not being rotated on SIGHUP
Bug #1420: inverted matching on incomplete session
Bug #1462: various issues in rule and yaml parsing

Security

The TLS/DER parsing issue has CVE-2015-0971 assigned to it.



2.1 Beta 4

Changelog

New Features

Feature #1448: xbits support
Feature #336: Add support for NETMAP to Suricata
Feature #885: smtp file_data support
Feature #1394: Improve TCP reuse support
Feature #1445: Suricata does not work on pfSense/FreeBSD interfaces using PPPoE
Feature #1447: Ability to reject ICMP traffic
Feature #1410: add alerts to EVE’s drop logs

Improvements

Optimization #1014: app layer reassembly fast-path
Optimization #1377: flow manager: reduce (try)locking
Optimization #1403: autofp packet pool performance problems
Optimization #1409: http pipeline support for stateful detection
Bug #1314: http-events performance issues

Bugs

Bug #1340: null ptr dereference in Suricata v2.1beta2
Bug #1352: file list is not cleaned up
Bug #1358: Gradual memory leak using reload (kill -USR2 $pid)
Bug #1366: Crash if default_packet_size is below 32 bytes
Bug #1378: stats api doesn’t call thread deinit funcs
Bug #1384: tcp midstream window issue (master)
Bug #1388: pcap-file hangs on systems w/o atomics support (master)
Bug #1392: http uri parsing issue (master)
Bug #1393: CentOS 5.11 build failures
Bug #1398: DCERPC traffic parsing issue (master)
Bug #1401: inverted matching on incomplete session
Bug #1402: When re-opening files on HUP (rotation) always use the append flag.
Bug #1417: no rules loaded – latest git – rev e250040
Bug #1425: dead lock in de_state vs flowints/flowvars
Bug #1426: Files prematurely truncated by detection engine even though force-md5 is enabled
Bug #1429: stream: last_ack update issue leading to stream gaps
Bug #1435: EVE-Log alert payload option loses data
Bug #1441: Local timestamps in json events
Bug #1446: Unit ID check in Modbus packet error
Bug #1449: smtp parsing issue
Bug #1451: Fix list-keywords regressions
Bug #1463: modbus parsing issue
[close]



http://suricata-ids.org/
Titel: Suricata 3.0
Beitrag von: SiLæncer am 28 Januar, 2016, 17:00
Features and Improvements

    improved detection options, including multi-tenancy and xbits
    performance and scalability much improved
    much improved accuracy and robustness
    Lua scripting capabilities expanded significantly
    many output improvements, including much more JSON
    NETMAP capture method support, especially interesting to FreeBSD users
    SMTP inspection and file extraction

For a full list of features added, please see:
 Full Changelog

Detection

Feature #885: smtp file_data support
Feature #707: ip reputation files - network range inclusion availability (cidr)
Feature #1448: xbits
Feature #1282: support for base64_decode keyword
Feature #1137: Support IP lists in threshold.config
Feature #1440: wildcard rule loading
Feature #1281: support content keyword length greater than 255
Feature #1408: multi tenancy for detection
Feature #1514: SSH softwareversion regex should allow colon

Outputs

Feature #1582: Redis output support
Feature #1228: stats.log in JSON format
Feature #1155: Log packet payloads in eve alerts
Feature #1208: JSON Output Enhancement - Include Payload(s)
Feature #1248: flow/connection logging
Feature #1258: json: include HTTP info with Alert output
Feature #383: stream data logging
Feature #893: feature, put more info in the "drop.log"
Feature #1123: JSON logs timestamp option
Feature #1154: Get the rule when packets are dropped
Feature #1116: ips packet stats in stats.log
Feature #1410: add alerts to EVE's drop logs
Feature #1586: Add flow memcap counter
Feature #1599: rule profiling: json output
Feature #1605: more descriptive err msg - getting MTU via ioctl
Feature #1635: unified2 output: disable by default
Feature #1498: color output
Feature #1499: json output for engine messages
Feature #1374: Write pre-aggregated counters for all threads
Feature #1454: JSON output prefix
Feature #1492: Add HUP coverage to output json-log

Packet Decoding & Protocol Parsing

Feature #899: MPLS over Ethernet support
Feature #1310: Modbus parsing and matching
Feature #1438: DNS Type nxdomain
Feature #1394: Improve TCP reuse support
Feature #1342: Support Cisco erspan traffic
Feature #1265: Replace response on Suricata dns decoder when dns error please
Feature #549: Extract file attachments from emails

Scripting

Feature #1263: Lua: Access to Stream Payloads
Feature #1264: Lua: access to TCP quad / Flow Tuple
Feature #1312: Lua output support
Feature #1261: Request for Additional Lua Capabilities
Feature #1309: Lua support for Stats output
Feature #1317: Lua: Indicator for end of flow
Feature #1502: Expose tls fields to lua
Feature #1568: TLS lua output support
Feature #1569: SSH lua support
Packet Capture & IPS

Feature #336: Add support for NETMAP to Suricata.
Feature #1445: Suricata does not work on pfSense/FreeBSD interfaces using PPPoE
Feature #1447: Ability to reject ICMP traffic

Misc

Feature #1333: unix-socket: allow (easier) non-root usage
Feature #1527: Add ability to compile as a Position-Independent Executable (PIE)

Zugehörige Tickets

Bug #1673: smtp: crash during mime parsing

[close]

Quelle & DL : http://suricata-ids.org/2016/01/27/suricata-3-0-available/
Titel: Suricata 3.0.1
Beitrag von: SiLæncer am 09 April, 2016, 15:00
Whats new:>>

fixes for multiple stability issues
many memory leak fixes
Hyperscan MPM support (experimental)

http://suricata-ids.org/
Titel: Suricata 3.1
Beitrag von: SiLæncer am 04 Juli, 2016, 09:11
Whats new:>>

fixed:

Bug #1589: Cannot run nfq in workers mode
Bug #1804: yaml: legacy detect-engine parsing custom values broken

http://suricata-ids.org/
Titel: Suricata 3.2
Beitrag von: SiLæncer am 31 Januar, 2017, 18:00
Changelog

Feature #1830: support ‘tag’ in eve log
Feature #1870: make logged flow_id more unique
Feature #1874: support Cisco Fabric Path / DCE
Feature #1885: eve: add option to log all dropped packets
Feature #1886: dns: output filtering
Bug #1849: ICMPv6 incorrect checksum alert if Ethernet FCS is present
Bug #1853: fix dce_stub_data buffer
Bug #1854: unified2: logging of tagged packets not working
Bug #1856: PCAP mode device not found
Bug #1858: Lots of TCP ‘duplicated option/DNS malformed request data’
after upgrading from 3.0.1 to 3.1.1
Bug #1878: dns: crash while logging sshfp records
Bug #1880: icmpv4 error packets can lead to missed detection in tcp/udp
Bug #1884: libhtp 0.5.22

[close]

http://suricata-ids.org/
Titel: Suricata 3.2.1
Beitrag von: SiLæncer am 16 Februar, 2017, 06:00
Changelog

Changes you can expect from this new release include:

Feature #1830: support ‘tag’ in eve log
Feature #1870: make logged flow_id more unique
Feature #1874: support Cisco Fabric Path / DCE
Feature #1885: eve: add option to log all dropped packets
Feature #1886: dns: output filtering
Bug #1849: ICMPv6 incorrect checksum alert if Ethernet FCS is present
Bug #1853: fix dce_stub_data buffer
Bug #1854: unified2: logging of tagged packets not working
Bug #1856: PCAP mode device not found
Bug #1858: Lots of TCP ‘duplicated option/DNS malformed request data’
after upgrading from 3.0.1 to 3.1.1
Bug #1878: dns: crash while logging sshfp records
Bug #1880: icmpv4 error packets can lead to missed detection in tcp/udp
Bug #1884: libhtp 0.5.22

[close]

http://suricata-ids.org/
Titel: Suricata 3.2.3
Beitrag von: SiLæncer am 14 Juli, 2017, 20:00
Changelog

Bug #2089: engine file logging race condition (3.2.x)
Bug #2173: openbsd: pcap with raw datalink not supported (3.2.x)
Bug #2178: asn1/der: stack overflow (3.2.x)
Bug #2179: Possible confusion or bypass within the stream engine with retransmits. (3.2.x)
Bug #2183: gcc 7.1.1 ‘format truncation’ compiler warnings (3.2.x)

[close]

http://suricata-ids.org/
Titel: Suricata 4.0.0 RC 2
Beitrag von: SiLæncer am 14 Juli, 2017, 21:00
Changelog

Feature #744: Teredo configuration
Feature #1748: lua: expose tx in alert lua scripts
Bug #1855: alert number output
Bug #1888: noalert in a pass rule disables the rule
Bug #1957: PCRE lowercase enforcement in http_host buffer does not allow for upper case in hex-encoding
Bug #1958: Possible confusion or bypass within the stream engine with retransmits.
Bug #2110: isdataat: keyword memleak
Bug #2162: rust/nfs: reachable asserting rust panic
Bug #2175: rust/nfs: panic – 4.0.0-dev (rev 7c25a2d)
Bug #2176: gcc 7.1.1 ‘format truncation’ compiler warnings
Bug #2177: asn1/der: stack overflow

[close]

http://suricata-ids.org/
Titel: Suricata 4.0.0 Final
Beitrag von: SiLæncer am 02 August, 2017, 05:00
Release Notes

We are thrilled to announce Suricata 4.0 is now available!

This is a major release, improving detection capabilities, more protocols, adding new output options, Rust support, and much more. Thanks to valuable feedback from the rule writing teams at Emerging Threats, Positive Technologies, and many others Suricata 4.0 includes many rule keywords for inspecting HTTP, SSH and other protocols. New features allow for greater context with alerts. Also, Suricata 4.0 is the first release in which implemented parts in the Rust language using the Nom parser framework have been incorporated. This work was inspired by presentations from SuriCon 2016.

[close]

Quelle & weitere Infos : https://oisf.net/2017/08/01/suricata-4-0-kicks-it-up-a-notch/

http://suricata-ids.org/
Titel: Suricata 4.0.1
Beitrag von: SiLæncer am 10 November, 2017, 20:00
Changelog

Feature #2114: Redis output: add RPUSH support
Feature #2152: Packet and Drop Counters for Napatech
Bug #2050: TLS rule mixes up server and client certificates
Bug #2064: Rules with dual classtype do not error
Bug #2074: detect msg: memory leak
Bug #2102: Rules with dual sid do not error
Bug #2103: Rules with dual rev do not error
Bug #2151: The documentation does not reflect current suricata.yaml regarding cpu-affinity
Bug #2194: rust/nfs: sigabrt/rust panic – 4.0.0-dev (rev fc22943)
Bug #2197: rust build with lua enabled fails on x86
Bug #2201: af_packet: suricata leaks memory with use-mmap enabled and incorrect BPF filter
Bug #2207: DNS UDP “Response” parsing recording an incorrect value
Bug #2208: mis-structured JSON stats output if interface name is shortened
Bug #2226: improve error message if stream memcaps too low
Bug #2228: enforcing specific number of threads with autofp does not seem to work
Bug #2244: detect state uses broken offset logic (4.0.x)

[close]

Quelle: https://suricata-ids.org/2017/10/18/suricata-4-0-1-available/

http://suricata-ids.org/
Titel: Suricata 4.0.3
Beitrag von: SiLæncer am 30 Dezember, 2017, 10:00
Changelog

Feature #2245: decoder for ieee802.1AH traffic
Bug #798: stats.log in yaml config – append option – missing
Bug #891: detect-engine.profile does not err out in incorrect values – suricata.yaml
Bug #961: max pending packets variable parsing
Bug #1185: napatech: cppcheck warning
Bug #2215: Lost events writing to unix socket
Bug #2230: valgrind memcheck – 4.0.0-dev (rev 1180687)
Bug #2250: detect: mixing byte_extract and isdataat leads to FP & FN
Bug #2263: content matches disregarded when using dns_query on udp traffic
Bug #2274: ParseSizeString in util-misc.c: Null-pointer dereference
Bug #2275: ConfGetInt in conf.c: NULL-pointer dereference
Bug #2276: conf: NULL-pointer dereference in CoredumpLoadConfig
Bug #2293: rules: depth < content rules not rejected
Bug #2324: segfault in http_start (4.0.x)
Bug #2325: Suricata segfaults on ICMP and flowint check (4.0.x)

[close]

Quelle: https://suricata-ids.org/2017/12/06/suricata-4-0-3-available/

http://suricata-ids.org/
Titel: Suricata 4.0.4.1
Beitrag von: SiLæncer am 23 März, 2018, 05:00
Changelog

Security:

CVE-2018-6794 was requested for issue #2440

Changes:

Bug #2306: suricata 4 deadlocks during failed output log reopening
Bug #2361: rule reload hangup
Bug #2389: BUG_ON asserts in AppLayerIncFlowCounter (4.0.x)
Bug #2392: libhtp 0.5.26 (4.0.x)
Bug #2422: [4.0.3] af_packet: a leak that (possibly) breaks an inline channel
Bug #2438: various config parsing issues
Bug #2439: Fix timestamp offline when pcap timestamp is zero (4.0.x)
Bug #2440: stream engine bypass issue (4.0.x)
Bug #2441: der parser: bad input consumes cpu and memory (4.0.x)
Bug #2443: DNP3 memcpy buffer overflow (4.0.x)
Bug #2444: rust/dns: Core Dump with malformed traffic (4.0.x)
Bug #2445: http bodies / file_data: thread space creation writing out of bounds

[close]

http://suricata-ids.org/
Titel: Suricata 4.0.5
Beitrag von: SiLæncer am 21 Juli, 2018, 19:00
Changelog

Security:

CVE-2018-10242, CVE-2018-10244 (suricata)
CVE-2018-10243 (libhtp)

Changes:

Bug #2480: http eve log data source/dest flip (4.0.x)
Bug #2482: HTTP connect: difference in detection rates between 3.1 and 4.0.x
Bug #2531: yaml: ConfYamlHandleInclude memleak (4.0.x)
Bug #2532: memleak: when using app-layer event rules without rust
Bug #2533: Suricata gzip unpacker bypass (4.0.x)
Bug #2534: Suricata stops inspecting TCP stream if a TCP RST was met (4.0.x)
Bug #2535: Messages with SC_LOG_CONFIG level are logged to syslog with EMERG priority (4.0.x)
Bug #2537: libhtp 0.5.27 (4.0.x)
Bug #2540: getrandom prevents any suricata start commands on more later OS’s (4.0.x)
Bug #2544: ssh out of bounds read (4.0.x)
Bug #2545: enip out of bounds read (4.0.x)

[close]

http://suricata-ids.org/
Titel: Suricata 4.1rc1
Beitrag von: SiLæncer am 27 Juli, 2018, 17:00
Release Notes

It’s summer, so an excellent time for some testing! Suricata 4.1 release candidate 1 is here to be tried out. The release brings a lot of new features.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.0-rc1.tar.gz

Main new features are inclusion of the protocols SMBv1/2/3, NFSv4, Kerberos, FTP, DHCP, IKEv2, as well as improvements on Linux capture side via AF_PACKET XDP support and on Windows IPS side via WinDivert. The progress in Rust usage inside Suricata continues as most of the new protocols have been implemented in Rust.

We invite everyone to test this release and report your experiences to us.
Protocol updates

    SMBv1/2/3 parsing, logging, file extraction
    JA3 TLS client fingerprinting (Mats Klepsland)
    TFTP: basic logging (Pascal Delalande and Clément Galland)
    FTP: file extraction
    Kerberos parser and logger (Pierre Chifflier)
    IKEv2 parser and logger (Pierre Chifflier)
    DHCP parser and logger
    Flow tracking for ICMPv4
    Initial NFS4 support
    HTTP: handle sessions that only have a response, or start with a response
    HTTP Flash file decompression support (Giuseppe Longo)

Output and logging

    File extraction v2: deduplication; hash-based naming; json metadata and cleanup tooling
    Eve metadata: from rules (metadata keyword) and traffic (flowbits etc)
    Eve: new more compact DNS record format (Giuseppe Longo)
    Pcap directory mode: process all pcaps in a directory (Danny Browning)
    Compressed PCAP logging (Max Fillinger)
    Expanded XFF support (Maurizio Abba)

Packet Capture

    AF_PACKET XDP and eBPF support for high speed packet capture
    Windows IPS: WinDivert support (Jacob Masen-Smith)

Misc

    Windows: MinGW is now supported
    Detect: transformation keyword support
    Bundled Suricata-Update

Major changes since 4.1beta1

    WinDivert support
    Kerberos parser and logger
    IKEv2 parser and logger
    DHCP parser and logger
    Flow tracking for ICMPv4
    Initial NFS4 support
    Compressed PCAP logging
    Expanded XFF support
    Decode GRE over IP (Paulo Pacheco)
    Multi-tenancy fixes
    SMB improvements for midstream pickup
    Update Suricata-Update to 1.0.0rc1

Security

CVE-2018-10242, CVE-2018-10244 (suricata)
CVE-2018-10243 (libhtp)

[close]

http://suricata-ids.org/
Titel: Suricata 4.1.0.1
Beitrag von: SiLæncer am 08 November, 2018, 19:00
Release Notes

After a longer than intended release development cycle, the OISF development team is proud to present Suricata 4.1.

Main new features are inclusion of the protocols SMBv1/2/3, NFSv4, Kerberos, FTP, DHCP, IKEv2. All of them have been implemented in Rust to ensure their introduction will not be compromising to the security and the stability of the complete system.

Support for tracking and logging TLS 1.3 has been added, including JA3 support.

On performance side, one of the main improvements is the availability of capture bypass for AF_PACKET implemented on top of the new eXpress Data Path (XDP) capability of Linux kernel. Windows users will benefit from the 4.1 release with a new IPS mode based on WinDivert.

All new protocols require Rust so Suricata 4.1 is not really 4.1 if you don’t have Rust. This is why the build system is now enabling Rust by default if it is available on the build machine.

This is the first release where Suricata-Update 1.0, the new Suricata rule updater, is bundled.
Protocol updates

    SMBv1/2/3 parsing, logging, file extraction
    TLS 1.3 parsing and logging (Mats Klepsland)
    JA3 TLS client fingerprinting (Mats Klepsland)
    TFTP: basic logging (Pascal Delalande and Clément Galland)
    FTP: file extraction
    Kerberos parser and logger (Pierre Chifflier)
    IKEv2 parser and logger (Pierre Chifflier)
    DHCP parser and logger
    Flow tracking for ICMPv4
    Initial NFS4 support
    HTTP: handle sessions that only have a response, or start with a response
    HTTP Flash file decompression support (Giuseppe Longo)

Output and logging

    File extraction v2: deduplication; hash-based naming; json metadata and cleanup tooling
    Eve metadata: from rules (metadata keyword) and traffic (flowbits etc)
    Eve: new more compact DNS record format (Giuseppe Longo)
    Pcap directory mode: process all pcaps in a directory (Danny Browning)
    Compressed PCAP logging (Max Fillinger)
    Expanded XFF support (Maurizio Abba)
    Community Flow Id support (common ID between Suricata and Bro/Zeek)

Packet Capture

    AF_PACKET XDP and eBPF support for high speed packet capture
    Windows IPS: WinDivert support (Jacob Masen-Smith)
    PF_RING: usability improvements

Misc

    Windows: MinGW is now supported
    Detect: transformation keyword support
    Bundled Suricata-Update
    Per device multi-tenancy

Minor Changes since 4.1rc2

    Coverity fixes and annotations
    Update Suricata-Update to 1.0.0

Security

    SMTP crash issue was fixed: CVE-2018-18956
    Robustness of defrag against FragmentSmack was improved
    Robustness of TCP reassembly against SegmentSmack was improved

[close]

Quelle & DL : https://suricata-ids.org/2018/11/06/suricata-4-1-released/
Titel: Suricata 4.1.2.1
Beitrag von: SiLæncer am 28 Dezember, 2018, 13:00
Release Notes

Much sooner than planned we are releasing 4.1.2. The 4.1.1 process didn’t go as planned. First the tarball was missing the vendored Rust crates. Then we found that Suricata-Update didn’t properly function on CentOS 7, Ubunut 14.04 and other slightly older distros. Then last minute we found yet another Suricata-Update bug.

So despite it being so close to the holidays for many, we decided to push 4.1.2 out already. Apologies for the inconvenience this may cause.

Other than the issues mention above, we did also fix some additional issues. SMB logging accuracy was improved, DNS detection and logging accuracy was improved and some documentation updates are included as well.

After the holidays are over we’re going to review our QA for both Suricata and Suricata-Update, so we can avoid issue like this in the future.

Changes

    Feature #1863: smtp: improve pipelining support
    Feature #2748: bundle libhtp 0.5.29
    Feature #2749: bundle suricata-update 1.0.3
    Bug #2682: python-yaml Not Listed As Ubuntu Prerequisite
    Bug #2736: DNS Golden Transaction ID – detection bypass
    Bug #2745: Invalid detect-engine config could lead to segfault
    Bug #2752: smb: logs for IOCTL and DCERPC have tree_id value of 0

[close]

Quelle & DL : https://suricata-ids.org/2018/12/21/suricata-4-1-2-released/
Titel: RanSim 1.1.0.76
Beitrag von: SiLæncer am 15 März, 2019, 17:00
(https://i.postimg.cc/9XnDTzh2/screenshot-1359.png)
RanSim gives you a quick look at the effectiveness of your existing network protection. Find out how vulnerable your network is against ransomware Find out how vulnerable your network is against ransomware and cryptomining attacks attacks. Bad guys are constantly coming out with new versions of ransomware strains to evade detection. Is your network effective in blocking ransomware when employees fall for social engineering attacks?

RanSim will simulate 13 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

Freeware

https://www.knowbe4.com/ransomware-simulator
Titel: Suricata 4.1.3
Beitrag von: SiLæncer am 19 März, 2019, 20:00
Release Notes

We’re pleased to announce Suricata 4.1.3. This release fixes a number of issues found in the 4.1-series.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-4.1.3.tar.gz
Changes

    Bug #2225: when stats info dumping in redis,the decoder.ipv4.trunc_pkt can’t output.In the same time, in the stats.log this can output
    Bug #2362: rule reload with workers mode and NFQUEUE not working stable
    Bug #2761: Include ebpf files in distributed sources
    Bug #2762: SSLv3 – AddressSanitizer heap-buffer-overflow
    Bug #2770: TCP FIN/ACK, RST/ACK in HTTP – detection bypass
    Bug #2788: afpacket doesn’t wait for all capture threads to start
    Bug #2805: dns v1/2 with rust results in less app layer data available in the alert record (for dns related alerts/rules) (4.1.x)
    Bug #2811: netmap/afpacket IPS: stream.inline: auto broken
    Bug #2823: configure.ac: broken –{enable,disable}-xxx options (4.1.x)
    Bug #2842: IPS mode crash under load
    Bug #2855: Suricata does not bridge host <-> hw rings (Affects FreeBSD 11-STABLE, FreeBSD 12 and FreeBSD 13-CURRENT)
    Bug #2862: pcre related FP in HTTP inspection (4.1.x)
    Bug #2865: Suricata rule sid:2224005 SURICATA IKEv2 weak cryptographic parameters (Diffie-Hellman) not works (4.1.x)
    Feature #2774: pcap multi dev support for Windows

[close]

Quelle & DL : https://suricata-ids.org/2019/03/07/suricata-4-1-3-released/
Titel: Suricata 4.1.4.1
Beitrag von: SiLæncer am 30 Mai, 2019, 19:00
Changelog

We’re pleased to announce Suricata 4.1.4. This release fixes a number of issues found in the 4.1 branch.

Changes

    Bug #2870: pcap logging with lz4 coverity warning
    Bug #2883: ssh: heap buffer overflow
    Bug #2884: mpls: heapbuffer overflow in file decode-mpls.c
    Bug #2887: decode-ethernet: heapbuffer overflow in file decode-ethernet.c
    Bug #2888: 4.1.3 core in HCBDCreateSpace
    Bug #2894: smb 1 create andx request does not parse the filename correctly
    Bug #2902: rust/dhcp: panic in dhcp parser
    Bug #2903: mpls: cast of misaligned data leads to undefined behavior
    Bug #2904: rust/ftp: panic in ftp parser
    Bug #2943: rust/nfs: integer underflow
    This release includes Suricata-Update 1.0.5

[close]

Quelle & DL : https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/

Titel: Suricata 5.0.0
Beitrag von: SiLæncer am 16 Oktober, 2019, 17:00
Release Notes

The OISF’s Suricata development team is proud to announce Suricata 5.0.0. This release brings many new features and improvements.
RDP, SNMP, FTP and SIP

Three new protocol parsers and loggers, all community contributions. Zach Kelly created a Rust RDP parser, while Giuseppe Longo created SIP support. Rust master Pierre Chifflier contributed SNMP support. Since RDP and SIP were merged late in our development cycle they are disabled by default in the configuration. For FTP we have added an EVE logging facility.
JA3S

After contributing JA3 support in Suricata 4.1, Mats Klepsland has been working on JA3S support. JA3S is now available to the rule language and in the TLS logging output.
Datasets

Still experimental at this time, the initial work to support datasets is part of this release. It allows matching on large amounts of data. It is controlled from the rule language and will work with any ‘sticky buffer’.

See documentation at https://suricata.readthedocs.io/en/suricata-5.0.0/rules/datasets.html

We’ve already heard of people using this with millions of IOCs.
Documentation

With the help of many community members we’ve been improving the user documentation. Please see: https://suricata.readthedocs.io/en/suricata-5.0.0/
HTTP evader

We’ve been working hard to cover the final set of HTTP evader cases. This work has mostly gone into the bundled libhtp 0.5.31.
Rust

The most visible is that our Rust support is no longer optional. We’re convinced that Rust is a perfect match for Suricata, and we plan to increase its footprint in our code base steadily. By making it mandatory we’re able to remove parallel implementations and focus fully on making the Rust code better.
Protocol Detection

The protocol detection engine has been extended to provide better accuracy as well as support for dealing with asynchronous flows. These async flows are sometimes picked up in the wrong direction and the protocol detection engine can now reverse them.
Decoder Anomaly records in EVE

A new log record type has been added: ‘anomaly’. This logs the stream and decoder events that are set by the packet decoders. This is inspired by Zeeks (Bro) ‘weird’ log.
EVE improvements

VLAN and capture interface is now part of many more EVE records, even if they are flow records or records based on flow time out.

An option to log all HTTP headers to the EVE http records has been added.
Packet Capture

Eric Leblond has been working hard to getting hardware offload support working for eBPF. On Netronome cards the eBPF based flow bypass can now be offloaded to the NIC. As eBPF is becoming a standard in the Linux space, we are hoping to see other hardware offload soon as well.

Netmap support has been rewritten so the more advanced features of netmap, such as vale switches, can be used now.

Napatech usability has been improved.
Rule language: Sticky Buffers

As discussed at the Suricon 2018 brainstorm session, a new rule keyword scheme is being introduced. It takes the existing ‘sticky buffer’ approach with new keyword names to avoid confusion. The new scheme is <proto>.<buffer>, so for example ‘http.uri’ for the URI inspection.

A number of HTTP keywords have been added.

Unified Lua inspection mixed with the sticky buffers has also been implemented.
Python 3

With Python 2’s EOL approaching, we’ve made sure that all Suricata’s python code is Python 3 compliant.
Removals

Following our deprecation policy, we have removed the following parts: the plain text dns.log, the old files-json.log and support for the Tilera architecture.

https://suricata-ids.org/about/deprecation-policy/

[close]

https://suricata-ids.org/
Titel: Suricata 5.0.1
Beitrag von: SiLæncer am 19 Dezember, 2019, 17:00
Release Notes

We’re pleased to announce Suricata 5.0.1. This release fixes a number of issues found in the 5.0 branch. There are still a number of open issues that we are working on. See our 5.0.2 target here: https://redmine.openinfosecfoundation.org/versions/142

This release fixes a number of IPv4 and TCP evasion issues reported by Nicolas Adba.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.1.tar.gz
Changes

    Bug #1871: intermittent abort()s at shutdown and in unix-socket
    Bug #2810: enabling add request/response http headers in master
    Bug #3047: byte_extract does not work in some situations
    Bug #3073: AC_CHECK_FILE on cross compile
    Bug #3103: –engine-analysis warning for flow on an icmp request rule
    Bug #3120: nfq_handle_packet error -1 Resource temporarily unavailable warnings
    Bug #3237: http_accept not treated as sticky buffer by –engine-analysis
    Bug #3254: tcp: empty SACK option leads to decoder event
    Bug #3263: nfq: invalid number of bytes reported
    Bug #3264: EVE DNS Warning about defaulting to v2 as version is not set.
    Bug #3266: fast-log: icmp type prints wrong value
    Bug #3267: Support for tcp.hdr Behavior
    Bug #3275: address parsing: memory leak in error path
    Bug #3277: segfault when test a nfs pcap file
    Bug #3281: Impossible to cross-compile due to AC_CHECK_FILE
    Bug #3284: hash function for string in dataset is not correct
    Bug #3286: TCP evasion technique by faking a closed TCP session
    Bug #3324: TCP evasion technique by overlapping a TCP segment with a fake packet
    Bug #3328: bad ip option evasion
    Bug #3340: DNS: DNS over TCP transactions logged with wrong direction.
    Bug #3341: tcp.hdr content matches don’t work as expected
    Bug #3345: App-Layer: Not all parsers register TX detect flags that should
    Bug #3346: BPF filter on command line not honored for pcap file
    Bug #3362: cross compiling not affecting rust component of surrcata
    Bug #3376: http: pipelining tx id handling broken
    Bug #3386: Suricata is unable to get MTU from NIC after 4.1.0
    Bug #3389: EXTERNAL_NET no longer working in 5.0 as expected
    Bug #3390: Eve log does not generate pcap_filename when Interacting via unix socket in pcap processing mode
    Bug #3397: smtp: file tracking issues when more than one attachment in a tx
    Bug #3398: smtp: ‘raw-message’ option file tracking issues with multi-tx
    Bug #3399: smb: post-GAP some transactions never close
    Bug #3401: smb1: ‘event only’ transactions for bad requests never close
    Bug #3411: detect/asn1: crashes on packets smaller than offset setting
    Task #3364: configure: Rust 1.37+ has cargo-vendor support bundled into cargo.
    Documentation #2885: update documentation to indicate -i can be used multiple times
    Bundle Suricata-Update 1.1.1
    Bundle Libhtp 0.5.32

[close]

https://suricata-ids.org/
Titel: Suricata 5.0.2
Beitrag von: SiLæncer am 10 April, 2020, 20:00
Release Notes

We’re pleased to announce Suricata 5.0.2. This release fixes a number of issues found in the 5.0 branch.

Get the release here: https://www.openinfosecfoundation.org/download/suricata-5.0.2.tar.gz

Changes

    Bug #2993: Suricata 5.0.0beta1 memory allocation of 4294966034 bytes failed
    Bug #3380: Segfault when using multi-detect
    Bug #3400: smb: post-GAP file tx handling
    Bug #3424: nfs: post-GAP some transactions never close
    Bug #3425: nfs: post-GAP file tx handling
    Bug #3433: coverity: CID 1456679: Memory – corruptions (NEGATIVE_RETURNS)
    Bug #3434: coverity: CID 1456680: Incorrect expression (IDENTICAL_BRANCHES)
    Bug #3469: gcc10: compilation failure unless -fcommon is supplied (5.0.x)
    Bug #3473: Dropping privileges does not work with NFLOG (5.0.x)
    Documentation #3423: readthedocs shows title of documentation as “Suricata unknown documentation”

[close]

https://suricata-ids.org/
Titel: Suricata 5.0.3
Beitrag von: SiLæncer am 13 Mai, 2020, 06:00
Changelog

    Feature #3481: GRE ERSPAN Type 1 Support
    Feature #3613: Teredo port configuration
    Feature #3673: datasets: add ‘dataset-remove’ unix command
    Bug #3240: Dataset hash-size or prealloc invalid value logging
    Bug #3241: Dataset reputation invalid value logging
    Bug #3342: Suricata 5.0 crashes while parsing SMB data
    Bug #3450: signature with sticky buffer with subsequent pcre check in a different buffer loads but will never match
    Bug #3491: Backport 5 BUG_ON(strcasecmp(str, “any”) in DetectAddressParseString
    Bug #3507: rule parsing: memory leaks
    Bug #3526: 5.0.x Kerberos vulnerable to TCP splitting evasion
    Bug #3534: Skip over ERF_TYPE_META records
    Bug #3552: file logging: complete files sometimes marked ‘TRUNCATED’
    Bug #3571: rust: smb compile warnings
    Bug #3573: TCP Fast Open – Bypass of stateless alerts
    Bug #3574: Behavior for tcp fastopen
    Bug #3576: Segfault when facing malformed SNMP rules
    Bug #3577: SIP: Input not parsed when header values contain trailing spaces
    Bug #3580: Faulty signature with two threshold keywords does not generate an error and never match
    Bug #3582: random failures on sip and http-evader suricata-verify tests
    Bug #3585: htp: asan issue
    Bug #3592: Segfault on SMTP TLS
    Bug #3598: rules: memory leaks in pktvar keyword
    Bug #3600: rules: bad address block leads to stack exhaustion
    Bug #3602: rules: crash on ‘internal’-only keywords
    Bug #3604: rules: missing ‘consumption’ of transforms before pkt_data would lead to crash
    Bug #3606: rules: minor memory leak involving pcre_get_substring
    Bug #3609: ssl/tls: ASAN issue in SSLv3ParseHandshakeType
    Bug #3610: defrag: asan issue
    Bug #3612: rules/bsize: memory issue during parsing
    Bug #3614: build-info and configure wrongly display libnss status
    Bug #3644: Invalid memory read on malformed rule with Lua script
    Bug #3646: rules: memory leaks on failed rules
    Bug #3649: CIDR Parsing Issue
    Bug #3651: FTP response buffering against TCP stream
    Bug #3653: Recursion stack-overflow in parsing YAML configuration
    Bug #3660: Multiple DetectEngineReload and bad insertion into linked list lead to buffer overflow
    Bug #3665: FTP: Incorrect ftp_memuse calculation.
    Bug #3667: Signature with an IP range creates one IPOnlyCIDRItem by signe IP address
    Bug #3669: Rules reload with Napatech can hang Suricata UNIX manager process
    Bug #3672: coverity: data directory handling issues
    Bug #3674: Protocol detection evasion by packet splitting
    Optimization #3406: filestore rules are loaded without warning when filestore is not enabled
    Task #3478: libhtp 0.5.33
    Task #3514: SMTP should place restraints on variable length items (e.g., filenames)
    Documentation #3543: doc: add ipv4.hdr and ipv6.hdr
    Bundled libhtp 0.5.33
    Bundled Suricata-Update 1.1.2

[close]

https://suricata-ids.org/
Titel: Suricata 6.0.0 Beta 1
Beitrag von: SiLæncer am 25 August, 2020, 17:00
Changelog

initial HTTP/2 support
DCERPC logging
much improved EVE logging performance
RFB and MQTT protocol support, including detection and logging
HASSH support
conditional logging

[close]

https://suricata-ids.org/
Titel: Suricata 6.0.1
Beitrag von: SiLæncer am 14 Dezember, 2020, 18:00
Changelog

    http2: support file inspection API #4121

    fixed:

    Bug #1275: ET Rule 2003927 not matchin in suricata Actions
    Bug #3467: Alert metadata not present in EVE output when using Socket Control Pcap Processing Mode Actions
    Bug #3616: strip_whitespace causes FN Actions
    Bug #3726: Segmentation fault on rule reload when using libmagic Actions
    Bug #3856: dcerpc: last response packet not logged Actions
    Bug #3924: asan leak htp_connp_create Actions
    Bug #3925: dcerpc: crash in eve logging Actions
    Bug #3930: Out of memory from THashInitConfig called by DetectDatasetSetup Actions
    Bug #3994: SIGABRT TCPProtoDetectCheckBailConditions Actions
    Bug #4018: Napatech: Double release of packet possible in certain error cases. Actions
    Bug #4069: dcerpc: fix UDP transaction handling, free_tx, etc Actions
    Bug #4071: Null dereference in ipv4hdr GetData Actions
    Bug #4072: ssl: Integer underflow in SSL parser Actions
    Bug #4073: Protocol detection evasion by packet splitting on enip/SMB Actions
    Bug #4074: Timeout while loading many rules with keyword ssl_version Actions
    Bug #4076: http2: Memory leak when parsing signature with filestore Actions
    Bug #4085: Assertion from AdjustToAcked Actions
    Bug #4086: dns: memory leak in v1 dns eve logging Actions
    Bug #4090: icmpv4: header handling issue(s) Actions
    Bug #4091: byte_math: Offset is a signed value Actions
    Bug #4094: AddressSanitizer: dynamic-stack-buffer-overflow (util-crypt) Actions
    Bug #4100: ftp: Quadratic complexity in FTPGetOldestTx may lead to DOS Actions
    Bug #4109: mac address logging crash Actions
    Bug #4110: http: LibHTP wrong protocol with content duplication Actions
    Bug #4111: dnp3: DOS in long loop of zero sized objects Actions
    Bug #4120: http2: null ptr deref in http2 alert metadata Actions
    Bug #4124: dcerpc: UDP request response pair match is incorrect Actions
    Bug #4155: dnp3: memory leak when parsing objects with bytearrays Actions
    Bug #4156: dnp3: signed integer overflow Actions
    Bug #4158: PacketCopyData sets packet length even on failure Actions
    Bug #4173: dnp3: SV tests fail on big endian Actions
    Bug #4177: Rustc nightly warning getting the inner pointer of a temporary `CString` Actions
    Feature #2689: http: Normalized HTTP client body buffer Actions
    Feature #4121: http2: support file inspection API Actions
    Optimization #4114: Optmize Rust logging macros: SCLogInfo, SCLogDebug and friends Actions
    Task #4137: deprecate: eve.dns v1 record support Actions
    Task #4180: libhtp 0.5.36

[close]

https://suricata-ids.org/