Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
{ "binaries": [ { "binary_version": "3.2-2ubuntu3", "binary_name": "libhtp-0.5.23-1" }, { "binary_version": "3.2-2ubuntu3", "binary_name": "suricata" }, { "binary_version": "3.2-2ubuntu3", "binary_name": "suricata-hyperscan" }, { "binary_version": "3.2-2ubuntu3", "binary_name": "suricata-oinkmaster" } ] }