aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorCraig Leres <leres@FreeBSD.org>2023-05-19 17:35:07 +0000
committerCraig Leres <leres@FreeBSD.org>2023-05-19 17:35:07 +0000
commitbc531907561defe0b7a478fdd306384c863c2049 (patch)
tree5b825994ba865b80a712fe44db664d27ccd05e1b
parenta0ef5898beb4c6a73e9d94aaa452c0eb37cbb14c (diff)
downloadports-bc531907561defe0b7a478fdd306384c863c2049.tar.gz
ports-bc531907561defe0b7a478fdd306384c863c2049.zip
security/vuxml: Mark zeek < 5.0.9 as vulnerable as per:
https://github.com/zeek/zeek/releases/tag/v5.0.9 This release fixes the following potential DoS vulnerabilities: - A specially-crafted series of FTP packets with a CMD command with a large path followed by a very large number of replies could cause Zeek to spend a long time processing the data. - A specially-crafted with a truncated header can cause Zeek to overflow memory and potentially crash. - A specially-crafted series of SMTP packets can cause Zeek to generate a very large number of events and take a long time to process them. - A specially-crafted series of POP3 packets containing MIME data can cause Zeek to spend a long time dealing with each individual file ID. Reported by: Tim Wojtulewicz
-rw-r--r--security/vuxml/vuln/2023.xml36
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 599b125f6019..278b801d60b7 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,39 @@
+ <vuln vid="1ab7357f-a3c2-406a-89fb-fd00e49a71b5">
+ <topic>zeek -- potential DoS vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>zeek</name>
+ <range><lt>5.0.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Tim Wojtulewicz of Corelight reports:</p>
+ <blockquote cite="https://github.com/zeek/zeek/releases/tag/v5.0.9">
+ <p> A specially-crafted series of FTP packets with a CMD
+ command with a large path followed by a very large number
+ of replies could cause Zeek to spend a long time processing
+ the data. </p>
+ <p> A specially-crafted with a truncated header can cause
+ Zeek to overflow memory and potentially crash. </p>
+ <p> A specially-crafted series of SMTP packets can cause
+ Zeek to generate a very large number of events and take
+ a long time to process them. </p>
+ <p> A specially-crafted series of POP3 packets containing
+ MIME data can cause Zeek to spend a long time dealing
+ with each individual file ID. </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/zeek/zeek/releases/tag/v5.0.9</url>
+ </references>
+ <dates>
+ <discovery>2023-05-19</discovery>
+ <entry>2023-05-19</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b09d77d0-b27c-48ae-b69b-9641bb68b39e">
<topic>electron -- vulnerability</topic>
<affects>