Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
{ "binaries": [ { "binary_name": "libhtp-0.5.23-1", "binary_version": "3.2-2ubuntu3" }, { "binary_name": "suricata", "binary_version": "3.2-2ubuntu3" }, { "binary_name": "suricata-hyperscan", "binary_version": "3.2-2ubuntu3" }, { "binary_name": "suricata-oinkmaster", "binary_version": "3.2-2ubuntu3" } ] }