Elasticsearch

Packetbeat

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 18.12.2025 21:56:03
  • Zuletzt bearbeitet 23.12.2025 17:43:20

Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded ...

  • EPSS 0.06%
  • Veröffentlicht 18.12.2025 21:51:36
  • Zuletzt bearbeitet 23.12.2025 17:42:32

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an inv...

  • EPSS 0.12%
  • Veröffentlicht 18.12.2025 21:33:50
  • Zuletzt bearbeitet 23.12.2025 17:43:47

Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbe...

  • EPSS 0.54%
  • Veröffentlicht 08.12.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker...