Dismissed
Permalink
CVE-2026-26932
5.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): ADJACENT_NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
Improper Validation of Array Index in Packetbeat Leading to Denial of Service
Improper Validation of Array Index (CWE-129) in the PostgreSQL protocol parser in Packetbeat can lead Denial of Service via Input Data Manipulation (CAPEC-153). An attacker can send a specially crafted packet causing a Go runtime panic that terminates the Packetbeat process. This vulnerability requires the pgsql protocol to be explicitly enabled and configured to monitor traffic on the targeted port.
Affected products
Packetbeat
- =<9.2.4
- =<8.19.10
Matching in nixpkgs
pkgs.packetbeat
Network packet analyzer that ships data to Elasticsearch
Package maintainers
-
@basvandijk Bas van Dijk <v.dijk.bas@gmail.com>
-
@fadenb Tristan Helmich <tristan.helmich+nixos@gmail.com>
-
@dfithian Daniel Fithian <daniel.m.fithian@gmail.com>