FreeBSD : logstash-forwarder and logstash -- susceptibility to POODLE vulnerability (ad4d3871-1a0d-11e5-b43d-002590263bf5)

high Nessus Plugin ID 84382

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Elastic reports :

The combination of Logstash Forwarder and Lumberjack input (and output) was vulnerable to the POODLE attack in SSLv3 protocol. We have disabled SSLv3 for this combination and set the minimum version to be TLSv1.0. We have added this vulnerability to our CVE page and are working on filling out the CVE.

Thanks to Tray Torrance, Marc Chadwick, and David Arena for reporting this.

SSLv3 is no longer supported; TLS 1.0+ is required (compatible with Logstash 1.4.2+).

Solution

Update the affected packages.

See Also

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201065

https://www.elastic.co/blog/logstash-1-4-3-released

https://www.elastic.co/blog/logstash-forwarder-0-4-0-released

http://www.nessus.org/u?bc8a663a

Plugin Details

Severity: High

ID: 84382

File Name: freebsd_pkg_ad4d38711a0d11e5b43d002590263bf5.nasl

Version: 2.4

Type: local

Published: 6/25/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:logstash, p-cpe:/a:freebsd:freebsd:logstash-forwarder, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/24/2015

Vulnerability Publication Date: 6/9/2015