svn commit: r478426 - head/security/vuxml
Craig Leres
leres at FreeBSD.org
Thu Aug 30 00:09:59 UTC 2018
Author: leres
Date: Thu Aug 30 00:09:58 2018
New Revision: 478426
URL: https://svnweb.freebsd.org/changeset/ports/478426
Log:
Mark bro < 2.5.5 as vulnerable as per:
https://www.bro.org/download/NEWS.bro.html
Reviewed by: ler (mentor)
Approved by: ler (mentor)
Differential Revision: https://reviews.freebsd.org/D16948
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Aug 29 22:25:50 2018 (r478425)
+++ head/security/vuxml/vuln.xml Thu Aug 30 00:09:58 2018 (r478426)
@@ -58,6 +58,57 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d0be41fe-2a20-4633-b057-4e8b25c41780">
+ <topic>bro -- array bounds and potential DOS issues</topic>
+ <affects>
+ <package>
+ <name>bro</name>
+ <range><lt>2.5.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Corelight reports:</p>
+ <blockquote cite="https://www.bro.org/download/NEWS.bro.html">
+ <p>Bro 2.5.5 primarily addresses security issues:</p>
+ <ul>
+ <li>Fix array bounds checking in BinPAC: for arrays
+ that are fields within a record, the bounds check
+ was based on a pointer to the start of the record
+ rather than the start of the array field, potentially
+ resulting in a buffer over-read.</li>
+ <li>Fix SMTP command string comparisons: the number
+ of bytes compared was based on the user-supplied
+ string length and can lead to incorrect matches.
+ e.g. giving a command of "X" incorrectly matched
+ "X-ANONYMOUSTLS" (and an empty commands match
+ anything).</li>
+ </ul>
+ <p>Address potential vectors for Denial of Service:</p>
+ <ul>
+ <li>"Weird" events are now generally suppressed/sampled
+ by default according to some tunable parameters.</li>
+ <li>Improved handling of empty lines in several text
+ protocol analyzers that can cause performance issues
+ when seen in long sequences.</li>
+ <li>Add `smtp_excessive_pending_cmds' weird which
+ serves as a notification for when the "pending
+ command" queue has reached an upper limit and been
+ cleared to prevent one from attempting to slowly
+ exhaust memory.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.bro.org/download/NEWS.bro.html</url>
+ </references>
+ <dates>
+ <discovery>2018-08-28</discovery>
+ <entry>2018-08-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0904e81f-a89d-11e8-afbb-bc5ff4f77b71">
<topic>node.js -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list