FreeBSD : zeek -- potential DoS vulnerabilities (386a14bb-1a21-41c6-a2cf-08d79213379b)

high Nessus Plugin ID 183982

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 386a14bb-1a21-41c6-a2cf-08d79213379b advisory.

- Tim Wojtulewicz of Corelight reports: A specially-crafted SSL packet could cause Zeek to leak memory and potentially crash. A specially-crafted series of FTP packets could cause Zeek to log entries for requests that have already been completed, using resources unnecessarily and potentially causing Zeek to lose other traffic. A specially-crafted series of SSL packets could cause Zeek to output a very large number of unnecessary alerts for the same record. A specially-crafted series of SSL packets could cause Zeek to generate very long ssl_history fields in the ssl.log, potentially using a large amount of memory due to unbounded state growth A specially-crafted IEEE802.11 packet could cause Zeek to overflow memory and potentially crash (386a14bb-1a21-41c6-a2cf-08d79213379b)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://github.com/zeek/zeek/releases/tag/v6.0.2

http://www.nessus.org/u?17932d2c

Plugin Details

Severity: High

ID: 183982

File Name: freebsd_pkg_386a14bb1a2141c6a2cf08d79213379b.nasl

Version: 1.0

Type: local

Published: 10/27/2023

Updated: 10/27/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 10/27/2023

Vulnerability Publication Date: 10/27/2023