FreeBSD : zeek -- potential DoS vulnerabilty (a00c76d9-0c05-4d99-bef7-ae4521cb2a4d)

high Nessus Plugin ID 160061

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the a00c76d9-0c05-4d99-bef7-ae4521cb2a4d advisory.

- Tim Wojtulewicz of Corelight reports: Fix potential unbounded state growth in the FTP analyzer when receiving a specially-crafted stream of commands. This may lead to a buffer overflow and cause Zeek to crash. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability. (a00c76d9-0c05-4d99-bef7-ae4521cb2a4d)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://github.com/zeek/zeek/releases/tag/v4.0.6

http://www.nessus.org/u?546e8f93

Plugin Details

Severity: High

ID: 160061

File Name: freebsd_pkg_a00c76d90c054d99bef7ae4521cb2a4d.nasl

Version: 1.4

Type: local

Published: 4/21/2022

Updated: 11/6/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 4/21/2022

Vulnerability Publication Date: 4/21/2022