Suricata before 5.0.8 and 6.x before 6.0.4 allows TCP evasion via a client with a crafted TCP/IP stack that can send a certain sequence of segments.
{
"binaries": [
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "libhtp-0.5.23-1"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata-hyperscan"
},
{
"binary_version": "3.2-2ubuntu3",
"binary_name": "suricata-oinkmaster"
}
]
}