Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-D0BE41FE-2A20-4633-B057-4E8B25C41780: bro -- array bounds and potential DOS issues

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

FreeBSD: VID-D0BE41FE-2A20-4633-B057-4E8B25C41780: bro -- array bounds and potential DOS issues

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
08/28/2018
Created
03/19/2019
Added
08/30/2018
Modified
08/30/2018

Description

Corelight reports:

Bro 2.5.5 primarily addresses security issues:

Fix array bounds checking in BinPAC: for arrays

that are fields within a record, the bounds check

was based on a pointer to the start of the record

rather than the start of the array field, potentially

resulting in a buffer over-read.

Fix SMTP command string comparisons: the number

of bytes compared was based on the user-supplied

string length and can lead to incorrect matches.

e.g. giving a command of "X" incorrectly matched

"X-ANONYMOUSTLS" (and an empty commands match

anything).

Address potential vectors for Denial of Service:

"Weird" events are now generally suppressed/sampled

by default according to some tunable parameters.

Improved handling of empty lines in several text

protocol analyzers that can cause performance issues

when seen in long sequences.

Add `smtp_excessive_pending_cmds' weird which

serves as a notification for when the "pending

command" queue has reached an upper limit and been

cleared to prevent one from attempting to slowly

exhaust memory.

Solution(s)

  • freebsd-upgrade-package-bro

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;