FreeBSD : bro -- multiple memory allocation issues (2f4fd3aa-32f8-4116-92f2-68f05398348e)

high Nessus Plugin ID 110390

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Corelight reports :

Bro 2.5.4 primarily fixes security issues

Multiple fixes and improvements to BinPAC generated code related to array parsing, with potential impact to all Bro's BinPAC-generated analyzers in the form of buffer over-reads or other invalid memory accesses depending on whether a particular analyzer incorrectly assumed that the evaulated-array-length expression is actually the number of elements that were parsed out from the input.

The NCP analyzer (not enabled by default and also updated to actually work with newer Bro APIs in the release) performed a memory allocation based directly on a field in the input packet and using signed integer storage. This could result in a signed integer overflow and memory allocations of negative or very large size, leading to a crash or memory exhaustion. The new NCP::max_frame_size tuning option now limits the maximum amount of memory that can be allocated.

Solution

Update the affected package.

See Also

https://www.bro.org/download/NEWS.bro.html

http://www.nessus.org/u?ea41c2eb

Plugin Details

Severity: High

ID: 110390

File Name: freebsd_pkg_2f4fd3aa32f8411692f268f05398348e.nasl

Version: 1.2

Type: local

Published: 6/7/2018

Updated: 11/10/2018

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:bro, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/6/2018

Vulnerability Publication Date: 5/29/2018