Search Results (6 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-26933 2 Elastic, Elasticsearch 2 Packetbeat, Packetbeat 2026-03-23 5.7 Medium
Improper Validation of Array Index (CWE-129) in multiple protocol parser components in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker with the ability to send specially crafted, malformed network packets to a monitored network interface can trigger out-of-bounds read operations, resulting in application crashes or resource exhaustion. This requires the attacker to be positioned on the same network segment as the Packetbeat deployment or to control traffic routed to monitored interfaces.
CVE-2026-26932 2 Elastic, Elasticsearch 2 Packetbeat, Packetbeat 2026-03-12 5.7 Medium
Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.
CVE-2025-68388 2 Elastic, Elasticsearch 2 Packetbeat, Packetbeat 2025-12-23 5.3 Medium
Allocation of resources without limits or throttling (CWE-770) allows an unauthenticated remote attacker to cause excessive allocation (CAPEC-130) of memory and CPU via the integration of malicious IPv4 fragments, leading to a degradation in Packetbeat.
CVE-2025-68382 2 Elastic, Elasticsearch 2 Packetbeat, Packetbeat 2025-12-23 6.5 Medium
Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow (CAPEC-100) via the NFS protocol dissector, leading to a denial-of-service (DoS) through a reliable process crash when handling truncated XDR-encoded RPC messages.
CVE-2025-68381 2 Elastic, Elasticsearch 2 Packetbeat, Packetbeat 2025-12-23 6.5 Medium
Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploit a Buffer Overflow (CAPEC-100) and reliably crash the application or cause significant resource exhaustion via a single crafted UDP packet with an invalid fragment sequence number.
CVE-2017-11480 1 Elasticsearch 1 Packetbeat 2025-04-20 N/A
Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.