FreeBSD : logstash-forwarder and logstash -- susceptibility to POODLE vulnerability (ad4d3871-1a0d-11e5-b43d-002590263bf5)

High Nessus Plugin ID 84382


The remote FreeBSD host is missing one or more security-related updates.


Elastic reports :

The combination of Logstash Forwarder and Lumberjack input (and output) was vulnerable to the POODLE attack in SSLv3 protocol. We have disabled SSLv3 for this combination and set the minimum version to be TLSv1.0. We have added this vulnerability to our CVE page and are working on filling out the CVE.

Thanks to Tray Torrance, Marc Chadwick, and David Arena for reporting this.

SSLv3 is no longer supported; TLS 1.0+ is required (compatible with Logstash 1.4.2+).


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 84382

File Name: freebsd_pkg_ad4d38711a0d11e5b43d002590263bf5.nasl

Version: $Revision: 2.1 $

Type: local

Published: 2015/06/25

Modified: 2015/06/25

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:logstash, p-cpe:/a:freebsd:freebsd:logstash-forwarder, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/06/24

Vulnerability Publication Date: 2015/06/09