git: eb9cc2b88cb8 - main - security/vuxml: Mark zeek < 5.0.6 as vulnerable as per:
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 01 Feb 2023 19:04:50 UTC
The branch main has been updated by leres:
URL: https://cgit.FreeBSD.org/ports/commit/?id=eb9cc2b88cb8da14363d7f2119e2b2a008818840
commit eb9cc2b88cb8da14363d7f2119e2b2a008818840
Author: Craig Leres <leres@FreeBSD.org>
AuthorDate: 2023-02-01 19:04:19 +0000
Commit: Craig Leres <leres@FreeBSD.org>
CommitDate: 2023-02-01 19:04:19 +0000
security/vuxml: Mark zeek < 5.0.6 as vulnerable as per:
https://github.com/zeek/zeek/releases/tag/v5.0.6
This release fixes the following potential DoS vulnerabilities:
- A missing field in the SMB FSControl script-land record could
cause a heap buffer overflow when receiving packets containing
those header types.
- Receiving a series of packets that start with HTTP/1.0 and then
switch to HTTP/0.9 could cause Zeek to spend a large amount of
time processing the packets.
- Receiving large numbers of FTP commands sequentially from the
network with bad data in them could cause Zeek to spend a large
amount of time processing the packets, and generate a large
amount of events.
Reported by: Tim Wojtulewicz
---
security/vuxml/vuln/2023.xml | 34 ++++++++++++++++++++++++++++++++++
1 file changed, 34 insertions(+)
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 309a52ac539d..3d1fc8654e62 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,37 @@
+ <vuln vid="2b5fc9c4-eaca-46e0-83d0-9b10c51c4b1b">
+ <topic>zeek -- potential DoS vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>zeek</name>
+ <range><lt>5.0.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tim Wojtulewicz of Corelight reports:</p>
+ <blockquote cite="https://github.com/zeek/zeek/releases/tag/v5.0.6">
+ <p> A missing field in the SMB FSControl script-land record could
+ cause a heap buffer overflow when receiving packets containing
+ those header types. </p>
+ <p> Receiving a series of packets that start with HTTP/1.0
+ and then switch to HTTP/0.9 could cause Zeek to spend a
+ large amount of time processing the packets. </p>
+ <p> Receiving large numbers of FTP commands sequentially
+ from the network with bad data in them could cause Zeek
+ to spend a large amount of time processing the packets,
+ and generate a large amount of events. </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/zeek/zeek/releases/tag/v5.0.6</url>
+ </references>
+ <dates>
+ <discovery>2023-02-01</discovery>
+ <entry>2023-02-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ee890be3-a1ec-11ed-a81d-001b217b3468">
<topic>Gitlab -- Multiple Vulnerabilities</topic>
<affects>