vulnerability
FreeBSD: VID-96d6809a-81df-46d4-87ed-2f78c79f06b1: zeek -- potential DoS vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Apr 12, 2023 | Apr 14, 2023 | Dec 10, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 12, 2023
Added
Apr 14, 2023
Modified
Dec 10, 2025
Description
Tim Wojtulewicz of Corelight reports: Receiving DNS responses from async DNS requests (via A specially-crafted stream of FTP packets containing a command reply with many intermediate lines can cause Zeek to spend a large amount of time processing data. A specially-crafted set of packets containing extremely large file offsets cause cause the reassembler code to allocate large amounts of memory. The DNS manager does not correctly expire responses that don't contain any data, such those containing NXDOMAIN or NODATA status codes. This can lead to Zeek allocating large amounts of memory for these responses and never deallocating them. A specially-crafted stream of RDP packets can cause Zeek to spend large protocol validation. A specially-crafted stream of SMTP packets can cause Zeek to spend large amounts of time processing data.
Solution
freebsd-upgrade-package-zeek
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.