git: 84a7773d270a - main - security/vuxml: Mark zeek < 4.0.6 as vulnerable as per:
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 21 Apr 2022 22:45:22 UTC
The branch main has been updated by leres:
URL: https://cgit.FreeBSD.org/ports/commit/?id=84a7773d270ad6fbab22807fe15b2ca967e3531b
commit 84a7773d270ad6fbab22807fe15b2ca967e3531b
Author: Craig Leres <leres@FreeBSD.org>
AuthorDate: 2022-04-21 22:43:25 +0000
Commit: Craig Leres <leres@FreeBSD.org>
CommitDate: 2022-04-21 22:43:25 +0000
security/vuxml: Mark zeek < 4.0.6 as vulnerable as per:
https://github.com/zeek/zeek/releases/tag/v4.0.6
- Fix potential unbounded state growth in the FTP analyzer when
receiving a specially-crafted stream of commands. This may lead
to a buffer overflow and cause Zeek to crash. Due to the possibility
of this happening with packets received from the network, this
is a potential DoS vulnerabilty.
Reported by: Tim Wojtulewicz
---
security/vuxml/vuln-2022.xml | 30 ++++++++++++++++++++++++++++++
1 file changed, 30 insertions(+)
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 52a5480e870e..3e5a079487a3 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,33 @@
+ <vuln vid="a00c76d9-0c05-4d99-bef7-ae4521cb2a4d">
+ <topic>zeek -- potential DoS vulnerabilty</topic>
+ <affects>
+ <package>
+ <name>zeek</name>
+ <range><lt>4.0.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tim Wojtulewicz of Corelight reports:</p>
+ <blockquote cite="https://github.com/zeek/zeek/releases/tag/v4.0.6">
+ <p> Fix potential unbounded state growth in the FTP
+ analyzer when receiving a specially-crafted stream of
+ commands. This may lead to a buffer overflow and cause
+ Zeek to crash. Due to the possibility of this happening
+ with packets received from the network, this is a potential
+ DoS vulnerabilty. </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/zeek/zeek/releases/tag/v4.0.6</url>
+ </references>
+ <dates>
+ <discovery>2022-04-21</discovery>
+ <entry>2022-04-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b019585a-bfea-11ec-b46c-b42e991fc52e">
<topic>zgrep -- arbitrary file write</topic>
<affects>