Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-3110B29E-C82D-4287-9F6C-DB82BB883B1E: zeek -- potential DoS vulnerabilities

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-3110B29E-C82D-4287-9F6C-DB82BB883B1E: zeek -- potential DoS vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/23/2022
Created
11/08/2022
Added
11/04/2022
Modified
11/04/2022

Description

Tim Wojtulewicz of Corelight reports:

Fix a possible overflow and crash in the ARP analyzer

when receiving a specially crafted packet. Due to the

possibility of this happening with packets received from

the network, this is a potential DoS vulnerability.

Fix a possible overflow and crash in the Modbus analyzer

when receiving a specially crafted packet. Due to the

possibility of this happening with packets received from

the network, this is a potential DoS vulnerability.

Fix two possible crashes when converting IP headers for

output via the raw_packet event. Due to the possibility of

this happening with packets received from the network, this

is a potential DoS vulnerability. Note that the raw_packet

event is not enabled by default so these are likely

low-severity issues.

Fix an abort related to an error related to the ordering

of record fields when processing DNS EDNS headers via events.

Due to the possibility of this happening with packets

received from the network, this is a potential DoS

vulnerability. Note that the dns_EDNS events are not

implemented by default so this is likely a low-severity

issue.

Solution(s)

  • freebsd-upgrade-package-zeek

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;