在最近更新了这一规则之后,我发现在Suricata发生了太多的事件:
alert ip any any -> any any (msg:"ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free"; ip_proto:4; metadata: former_category EXPLOIT; reference:url,www.jsof-tech.com/ripple20/; classtype:attempted-admin; sid:2030388; rev:1; metadata:signature_severity Major, created_at 2020_06_22, performance_impact Significant, updated_at 2020_06_22;)这很奇怪,因为它将所有数据包与IPIP协议(ip_proto:4)相匹配!此外,我还发现了卡内基梅隆大学CERT (链接)的另一条规则:
alert ip any any -> any any (msg:"VU#257161:CVE-2020-11900 IP-in-IP tunnel Double-Free https://kb.cert.org"; ip_proto:4; sid:1370257161; rev:1;)但这里也存在同样的问题!
我想知道我的理解是否正确。为什么Suricata在过去的3天里有超过1亿次的比赛?我怎么才能修好它?
https://security.stackexchange.com/questions/234364
复制相似问题