FreeBSD : zeek -- potential DoS vulnerabilty (204f1a7a-43df-412f-ad25-7dbe88f54fa4)

high Nessus Plugin ID 161830



The remote FreeBSD host is missing one or more security-related updates.


The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 204f1a7a-43df-412f-ad25-7dbe88f54fa4 advisory.

- Tim Wojtulewicz of Corelight reports: Fix potential hang in the DNS analyzer when receiving a specially-crafted packet. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability. (204f1a7a-43df-412f-ad25-7dbe88f54fa4)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 161830

File Name: freebsd_pkg_204f1a7a43df412fad257dbe88f54fa4.nasl

Version: 1.4

Type: local

Published: 6/4/2022

Updated: 11/6/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 6/3/2022

Vulnerability Publication Date: 6/1/2022