forked from Lainports/freebsd-ports
Service vulnerability: https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS - The NTLM analyzer did not properly handle AV Pair sequences that were either empty or unterminated, resulting in invalid memory access or heap buffer over-read. The NTLM analyzer is enabled by default and used in the analysis of SMB, DCE/RPC, and GSSAPI protocols. Approved by: ler (mentor, implicit) MFH: 2019Q3 Security: 55571619-454e-4769-b1e5-28354659e152
5 lines
376 B
Text
5 lines
376 B
Text
TIMESTAMP = 1568760632
|
|
SHA256 (bro-2.6.4.tar.gz) = a47a9cdcef0ea14d5f70c390ab266f0333063ff96f3869a5f1609581a1d1ceb7
|
|
SIZE (bro-2.6.4.tar.gz) = 28481281
|
|
SHA256 (bro-bro-netmap-cf88debf487b31ab30dc3b5bac64783b4e49997e_GH0.tar.gz) = 383423f92932c3ef244194954708b3a237b4f37ebc358014f51dcb3b9786896b
|
|
SIZE (bro-bro-netmap-cf88debf487b31ab30dc3b5bac64783b4e49997e_GH0.tar.gz) = 24630
|