Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 May 2023 17:35:32 GMT
From:      Craig Leres <leres@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: bc531907561d - main - security/vuxml: Mark zeek < 5.0.9 as vulnerable as per:
Message-ID:  <202305191735.34JHZW0d037847@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by leres:

URL: https://cgit.FreeBSD.org/ports/commit/?id=bc531907561defe0b7a478fdd306384c863c2049

commit bc531907561defe0b7a478fdd306384c863c2049
Author:     Craig Leres <leres@FreeBSD.org>
AuthorDate: 2023-05-19 17:35:07 +0000
Commit:     Craig Leres <leres@FreeBSD.org>
CommitDate: 2023-05-19 17:35:07 +0000

    security/vuxml: Mark zeek < 5.0.9 as vulnerable as per:
    
        https://github.com/zeek/zeek/releases/tag/v5.0.9
    
    This release fixes the following potential DoS vulnerabilities:
    
     - A specially-crafted series of FTP packets with a CMD command
       with a large path followed by a very large number of replies
       could cause Zeek to spend a long time processing the data.
    
     - A specially-crafted with a truncated header can cause Zeek to
       overflow memory and potentially crash.
    
     - A specially-crafted series of SMTP packets can cause Zeek to
       generate a very large number of events and take a long time to
       process them.
    
     - A specially-crafted series of POP3 packets containing MIME data
       can cause Zeek to spend a long time dealing with each individual
       file ID.
    
    Reported by:    Tim Wojtulewicz
---
 security/vuxml/vuln/2023.xml | 36 ++++++++++++++++++++++++++++++++++++
 1 file changed, 36 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 599b125f6019..278b801d60b7 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,39 @@
+  <vuln vid="1ab7357f-a3c2-406a-89fb-fd00e49a71b5">
+    <topic>zeek -- potential DoS vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>zeek</name>
+	<range><lt>5.0.9</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Tim Wojtulewicz of Corelight reports:</p>
+	<blockquote cite="https://github.com/zeek/zeek/releases/tag/v5.0.9">;
+	  <p> A specially-crafted series of FTP packets with a CMD
+	  command with a large path followed by a very large number
+	  of replies could cause Zeek to spend a long time processing
+	  the data. </p>
+	  <p> A specially-crafted with a truncated header can cause
+	  Zeek to overflow memory and potentially crash. </p>
+	  <p> A specially-crafted series of SMTP packets can cause
+	  Zeek to generate a very large number of events and take
+	  a long time to process them. </p>
+	  <p> A specially-crafted series of POP3 packets containing
+	  MIME data can cause Zeek to spend a long time dealing
+	  with each individual file ID. </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/zeek/zeek/releases/tag/v5.0.9</url>;
+    </references>
+    <dates>
+      <discovery>2023-05-19</discovery>
+      <entry>2023-05-19</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b09d77d0-b27c-48ae-b69b-9641bb68b39e">
     <topic>electron -- vulnerability</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202305191735.34JHZW0d037847>