Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Apr 2023 06:17:08 GMT
From:      Craig Leres <leres@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: 8045c67d846f - main - security/vuxml: Mark zeek < 5.0.8 as vulnerable as per:
Message-ID:  <202304120617.33C6H8H6080068@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by leres:

URL: https://cgit.FreeBSD.org/ports/commit/?id=8045c67d846f4264582d0833fbd114363e05cf27

commit 8045c67d846f4264582d0833fbd114363e05cf27
Author:     Craig Leres <leres@FreeBSD.org>
AuthorDate: 2023-04-12 06:16:37 +0000
Commit:     Craig Leres <leres@FreeBSD.org>
CommitDate: 2023-04-12 06:16:37 +0000

    security/vuxml: Mark zeek < 5.0.8 as vulnerable as per:
    
        https://github.com/zeek/zeek/releases/tag/v5.0.8
    
    This release fixes the following potential DoS vulnerabilities:
    
     - A specially-crafted stream of FTP packets containing a command
       reply with many intermediate lines can cause Zeek to spend a
       large amount of time processing data.
    
     - A specially-crafted set of packets containing extremely large
       file offsets cause cause the reassembler code to allocate large
       amounts of memory.
    
     - The DNS manager does not correctly expire responses that don't
       contain any data, such those containing NXDOMAIN or NODATA status
       codes. This can lead to Zeek allocating large amounts of memory
       for these responses and never deallocating them.
    
     - A specially-crafted stream of RDP packets can cause Zeek to spend
       large protocol validation.
    
     - A specially-crafted stream of SMTP packets can cause Zeek to
       spend large amounts of time processing data.
    
    Reported by:    Tim Wojtulewicz
---
 security/vuxml/vuln/2023.xml | 40 ++++++++++++++++++++++++++++++++++++++++
 1 file changed, 40 insertions(+)

diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index 09c522891c70..fb525b701160 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,43 @@
+  <vuln vid="96d6809a-81df-46d4-87ed-2f78c79f06b1">
+    <topic>zeek -- potential DoS vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>zeek</name>
+	<range><lt>5.0.8</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Tim Wojtulewicz of Corelight reports:</p>
+	<blockquote cite="https://github.com/zeek/zeek/releases/tag/v5.0.8">;
+	  <p> Receiving DNS responses from async DNS requests (via
+	  A specially-crafted stream of FTP packets containing a
+	  command reply with many intermediate lines can cause Zeek
+	  to spend a large amount of time processing data. </p>
+	  <p> A specially-crafted set of packets containing extremely
+	  large file offsets cause cause the reassembler code to
+	  allocate large amounts of memory. </p>
+	  <p> The DNS manager does not correctly expire responses
+	  that don't contain any data, such those containing NXDOMAIN
+	  or NODATA status codes. This can lead to Zeek allocating
+	  large amounts of memory for these responses and never
+	  deallocating them. </p>
+	  <p> A specially-crafted stream of RDP packets can cause
+	  Zeek to spend large protocol validation. </p>
+	  <p> A specially-crafted stream of SMTP packets can cause
+	  Zeek to spend large amounts of time processing data. </p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://github.com/zeek/zeek/releases/tag/v5.0.8</url>;
+    </references>
+    <dates>
+      <discovery>2023-04-12</discovery>
+      <entry>2023-04-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b54abe9d-7024-4d10-98b2-180cf1717766">
     <topic>py-beaker -- arbitrary code execution vulnerability</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202304120617.33C6H8H6080068>