Elasticsearch

Packetbeat

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Veröffentlicht 19.03.2026 17:08:45
  • Zuletzt bearbeitet 23.03.2026 13:33:43

Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to...

  • EPSS 0.02%
  • Veröffentlicht 26.02.2026 16:59:55
  • Zuletzt bearbeitet 12.03.2026 20:23:24

Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminate...

  • EPSS 0.06%
  • Veröffentlicht 18.12.2025 21:56:03
  • Zuletzt bearbeitet 23.12.2025 17:43:20

Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded ...

  • EPSS 0.06%
  • Veröffentlicht 18.12.2025 21:51:36
  • Zuletzt bearbeitet 23.12.2025 17:42:32

Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an inv...

  • EPSS 0.13%
  • Veröffentlicht 18.12.2025 21:33:50
  • Zuletzt bearbeitet 23.12.2025 17:43:47

Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbe...

  • EPSS 0.54%
  • Veröffentlicht 08.12.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker...