Snort 2.4.3 has a bug in processing fragmented ip packets which has ip options. frag3 preprocessor of snort skips [ip_option_length] bytes from end of the ip options when reassembling packet, thus allowing anyone to evade ids. Guys at snort.org already informed and are fixing the problem.