First published: Fri Dec 08 2017(Updated: )
Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.
Credit: bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elasticsearch Packetbeat | <5.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11480 is a denial of service flaw in the PostgreSQL protocol handler in Packetbeat versions prior to 5.6.4.
CVE-2017-11480 allows an attacker to send arbitrary network traffic to the monitored port, which can cause a denial of service condition in Packetbeat.
Packetbeat versions prior to 5.6.4 are affected by CVE-2017-11480.
To mitigate CVE-2017-11480, you should update Packetbeat to version 5.6.4 or later.
You can find more information about CVE-2017-11480 in the following reference: [https://discuss.elastic.co/t/beats-5-6-4-security-update/106739]