FreeBSD : zeek -- several potential DoS vulnerabilities (a550d62c-f78d-4407-97d9-93876b6741b9)

high Nessus Plugin ID 150168

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Tim Wojtulewicz of Corelight reports :

Fix potential Undefined Behavior in decode_netbios_name() and decode_netbios_name_type() BIFs. The latter has a possibility of a remote heap-buffer-overread, making this a potential DoS vulnerability.

Add some extra length checking when parsing mobile ipv6 packets. Due to the possibility of reading invalid headers from remote sources, this is a potential DoS vulnerability.

Solution

Update the affected package.

See Also

https://github.com/zeek/zeek/releases/tag/v4.0.2

http://www.nessus.org/u?7ba175b1

Plugin Details

Severity: High

ID: 150168

File Name: freebsd_pkg_a550d62cf78d440797d993876b6741b9.nasl

Version: 1.1

Type: local

Published: 6/3/2021

Updated: 6/3/2021

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/2/2021

Vulnerability Publication Date: 4/30/2021