git: 29c86bfa4cb5 - main - security/vuxml: Mark zeek < 7.0.3 as vulnerable as per:
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 05 Oct 2024 01:32:01 UTC
The branch main has been updated by leres: URL: https://cgit.FreeBSD.org/ports/commit/?id=29c86bfa4cb5d8ee11b032f16f61bd092c42dcf5 commit 29c86bfa4cb5d8ee11b032f16f61bd092c42dcf5 Author: Craig Leres <leres@FreeBSD.org> AuthorDate: 2024-10-05 01:31:38 +0000 Commit: Craig Leres <leres@FreeBSD.org> CommitDate: 2024-10-05 01:31:38 +0000 security/vuxml: Mark zeek < 7.0.3 as vulnerable as per: https://github.com/zeek/zeek/releases/tag/v7.0.3 This release fixes the following potential DoS vulnerability: - Adding to the POP3 hardening in 7.0.2, the parser now simply discards too many pending commands, rather than any attempting to process them. Further, invalid server responses do not result in command completion anymore. Processing out-of-order commands or finishing commands based on invalid server responses could result in inconsistent analyzer state, potentially triggering null pointer references for crafted traffic. Reported by: Tim Wojtulewicz --- security/vuxml/vuln/2024.xml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 18c604ce3aa5..c7a7e8ea2a68 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,35 @@ + <vuln vid="fe7031d3-3000-4b43-9fa6-52c2b624b8f9"> + <topic>zeek -- potential DoS vulnerability</topic> + <affects> + <package> + <name>zeek</name> + <range><lt>7.0.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Tim Wojtulewicz of Corelight reports:</p> + <blockquote cite="https://github.com/zeek/zeek/releases/tag/v7.0.3"> + <p> Adding to the POP3 hardening in 7.0.2, the parser now + simply discards too many pending commands, rather than + any attempting to process them. Further, invalid server + responses do not result in command completion anymore. + Processing out-of-order commands or finishing commands + based on invalid server responses could result in + inconsistent analyzer state, potentially triggering null + pointer references for crafted traffic. </p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/zeek/zeek/releases/tag/v7.0.3</url> + </references> + <dates> + <discovery>2024-10-05</discovery> + <entry>2024-10-05</entry> + </dates> + </vuln> + <vuln vid="0417d41a-8175-11ef-a5dc-b42e991fc52e"> <topic>firefox -- multiple vulnerabilities</topic> <affects>