From: Victor Julien Date: Wed, 20 Apr 2022 19:39:01 +0000 (+0200) Subject: smb: fix event types for limit exceeded rules X-Git-Tag: suricata-7.0.0-beta1~705 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=dc574604275f6fe90266bbfc5cb2430b86f9cc09;p=thirdparty%2Fsuricata.git smb: fix event types for limit exceeded rules --- diff --git a/rules/smb-events.rules b/rules/smb-events.rules index 4c15558660..159033f898 100644 --- a/rules/smb-events.rules +++ b/rules/smb-events.rules @@ -32,13 +32,13 @@ alert smb any any -> any any (msg:"SURICATA SMB supported READ size exceeded"; f alert smb any any -> any any (msg:"SURICATA SMB supported WRITE size exceeded"; flow:to_server; app-layer-event:smb.negotiate_max_write_size_too_large; classtype:protocol-command-decode; sid:2225013; rev:1;) # checks 'app-layer.protocols.smb.max-write-queue-size` against out of order chunks -alert smb any any -> any any (msg:"SURICATA SMB max WRITE queue size exceeded"; flow:to_server; app-layer-event:smb.write_queue_size_too_large; classtype:protocol-command-decode; sid:2225014; rev:1;) +alert smb any any -> any any (msg:"SURICATA SMB max WRITE queue size exceeded"; flow:to_server; app-layer-event:smb.write_queue_size_exceeded; classtype:protocol-command-decode; sid:2225014; rev:1;) # checks 'app-layer.protocols.smb.max-write-queue-cnt` against out of order chunks -alert smb any any -> any any (msg:"SURICATA SMB max WRITE queue cnt exceeded"; flow:to_server; app-layer-event:smb.write_queue_cnt_too_large; classtype:protocol-command-decode; sid:2225015; rev:1;) +alert smb any any -> any any (msg:"SURICATA SMB max WRITE queue cnt exceeded"; flow:to_server; app-layer-event:smb.write_queue_cnt_exceeded; classtype:protocol-command-decode; sid:2225015; rev:1;) # checks 'app-layer.protocols.smb.max-read-queue-size` against out of order chunks -alert smb any any -> any any (msg:"SURICATA SMB max READ queue size exceeded"; flow:to_client; app-layer-event:smb.read_queue_size_too_large; classtype:protocol-command-decode; sid:2225016; rev:1;) +alert smb any any -> any any (msg:"SURICATA SMB max READ queue size exceeded"; flow:to_client; app-layer-event:smb.read_queue_size_exceeded; classtype:protocol-command-decode; sid:2225016; rev:1;) # checks 'app-layer.protocols.smb.max-read-queue-cnt` against out of order chunks -alert smb any any -> any any (msg:"SURICATA SMB max READ queue cnt exceeded"; flow:to_client; app-layer-event:smb.read_queue_cnt_too_large; classtype:protocol-command-decode; sid:2225017; rev:1;) +alert smb any any -> any any (msg:"SURICATA SMB max READ queue cnt exceeded"; flow:to_client; app-layer-event:smb.read_queue_cnt_exceeded; classtype:protocol-command-decode; sid:2225017; rev:1;) # next sid 2225018 diff --git a/rust/src/smb/events.rs b/rust/src/smb/events.rs index 980801e4cd..4c621e5d4b 100644 --- a/rust/src/smb/events.rs +++ b/rust/src/smb/events.rs @@ -40,8 +40,8 @@ pub enum SMBEvent { ReadRequestTooLarge, /// READ response bigger than `max_read_size` ReadResponseTooLarge, - ReadResponseQueueSizeExceeded, - ReadResponseQueueCntExceeded, + ReadQueueSizeExceeded, + ReadQueueCntExceeded, /// WRITE request for more than `max_write_size` WriteRequestTooLarge, WriteQueueSizeExceeded, diff --git a/rust/src/smb/smb2.rs b/rust/src/smb/smb2.rs index 34c6a43573..a0786b22f5 100644 --- a/rust/src/smb/smb2.rs +++ b/rust/src/smb/smb2.rs @@ -164,10 +164,10 @@ pub fn smb2_read_response_record<'b>(state: &mut SMBState, r: &Smb2Record<'b>) set_event_fileoverlap = true; } if max_queue_size != 0 && tdf.file_tracker.get_inflight_size() + rd.len as u64 > max_queue_size.into() { - state.set_event(SMBEvent::ReadResponseQueueSizeExceeded); + state.set_event(SMBEvent::ReadQueueSizeExceeded); state.set_skip(Direction::ToClient, rd.len, rd.data.len() as u32); } else if max_queue_cnt != 0 && tdf.file_tracker.get_inflight_cnt() >= max_queue_cnt as usize { - state.set_event(SMBEvent::ReadResponseQueueCntExceeded); + state.set_event(SMBEvent::ReadQueueCntExceeded); state.set_skip(Direction::ToClient, rd.len, rd.data.len() as u32); } else { filetracker_newchunk(&mut tdf.file_tracker, files, flags, @@ -238,10 +238,10 @@ pub fn smb2_read_response_record<'b>(state: &mut SMBState, r: &Smb2Record<'b>) set_event_fileoverlap = true; } if max_queue_size != 0 && tdf.file_tracker.get_inflight_size() + rd.len as u64 > max_queue_size.into() { - state.set_event(SMBEvent::ReadResponseQueueSizeExceeded); + state.set_event(SMBEvent::ReadQueueSizeExceeded); state.set_skip(Direction::ToClient, rd.len, rd.data.len() as u32); } else if max_queue_cnt != 0 && tdf.file_tracker.get_inflight_cnt() >= max_queue_cnt as usize { - state.set_event(SMBEvent::ReadResponseQueueCntExceeded); + state.set_event(SMBEvent::ReadQueueCntExceeded); state.set_skip(Direction::ToClient, rd.len, rd.data.len() as u32); } else { filetracker_newchunk(&mut tdf.file_tracker, files, flags,