FreeBSD : zeek -- potential DoS vulnerabilities (3110b29e-c82d-4287-9f6c-db82bb883b1e)

high Nessus Plugin ID 164459

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 3110b29e-c82d-4287-9f6c-db82bb883b1e advisory.

- Tim Wojtulewicz of Corelight reports: Fix a possible overflow and crash in the ARP analyzer when receiving a specially crafted packet. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability. Fix a possible overflow and crash in the Modbus analyzer when receiving a specially crafted packet. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability. Fix two possible crashes when converting IP headers for output via the raw_packet event. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability. Note that the raw_packet event is not enabled by default so these are likely low-severity issues. Fix an abort related to an error related to the ordering of record fields when processing DNS EDNS headers via events. Due to the possibility of this happening with packets received from the network, this is a potential DoS vulnerability.
Note that the dns_EDNS events are not implemented by default so this is likely a low-severity issue. (3110b29e-c82d-4287-9f6c-db82bb883b1e)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://github.com/zeek/zeek/releases/tag/v5.0.1

http://www.nessus.org/u?f96b339b

Plugin Details

Severity: High

ID: 164459

File Name: freebsd_pkg_3110b29ec82d42879f6cdb82bb883b1e.nasl

Version: 1.2

Type: local

Published: 8/26/2022

Updated: 8/26/2022

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:zeek, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 8/26/2022

Vulnerability Publication Date: 8/23/2022