FreeBSD : zeek -- potential DoS vulnerabilities (1ab7357f-a3c2-406a-89fb-fd00e49a71b5)

high Nessus Plugin ID 176133

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 1ab7357f-a3c2-406a-89fb-fd00e49a71b5 advisory.

- Tim Wojtulewicz of Corelight reports: A specially-crafted series of FTP packets with a CMD command with a large path followed by a very large number of replies could cause Zeek to spend a long time processing the data. A specially-crafted with a truncated header can cause Zeek to overflow memory and potentially crash. A specially-crafted series of SMTP packets can cause Zeek to generate a very large number of events and take a long time to process them. A specially-crafted series of POP3 packets containing MIME data can cause Zeek to spend a long time dealing with each individual file ID. (1ab7357f-a3c2-406a-89fb-fd00e49a71b5)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://github.com/zeek/zeek/releases/tag/v5.0.9

http://www.nessus.org/u?b4df3192

Plugin Details

Severity: High

ID: 176133

File Name: freebsd_pkg_1ab7357fa3c2406a89fbfd00e49a71b5.nasl

Version: 1.0

Type: local

Published: 5/19/2023

Updated: 5/19/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 5/19/2023

Vulnerability Publication Date: 5/19/2023