Vulnerability Description
Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Elasticsearch | Packetbeat | < 5.6.4 |
Related Weaknesses (CWE)
References
- https://discuss.elastic.co/t/beats-5-6-4-security-update/106739Vendor Advisory
- https://discuss.elastic.co/t/beats-5-6-4-security-update/106739Vendor Advisory
FAQ
What is CVE-2017-11480?
CVE-2017-11480 is a vulnerability with a CVSS score of 7.5 (HIGH). Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary n...
How severe is CVE-2017-11480?
CVE-2017-11480 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11480?
Check the references section above for vendor advisories and patch information. Affected products include: Elasticsearch Packetbeat.