Logstash versions prior to 2.3.3, when using the Netflow Codec plugin, a remote attacker crafting malicious Netflow v5, Netflow v9 or IPFIX packets could perform a denial of service attack on the Logstash instance. The errors resulting from these crafted inputs are not handled by the codec and can cause the Logstash process to exit.
References
Link | Resource |
---|---|
https://www.elastic.co/community/security | Vendor Advisory |
https://www.elastic.co/community/security | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.elastic.co/community/security - Vendor Advisory |
Information
Published : 2017-06-16 21:29
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10363
Mitre link : CVE-2016-10363
CVE.ORG link : CVE-2016-10363
JSON object : View
Products Affected
elastic
- logstash