Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-2mj3-6grc-px38: Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration

Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration.

ghsa
#dos#git#intel#buffer_overflow

Skip to content

Navigation Menu

    • AI CODE CREATION

      • GitHub CopilotWrite better code with AI

      • GitHub SparkBuild and deploy intelligent apps

      • GitHub ModelsManage and compare prompts

      • MCP RegistryNewIntegrate external tools

View all features
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

Appearance settings

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2025-68383

Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration

Moderate severity GitHub Reviewed Published Dec 19, 2025 to the GitHub Advisory Database • Updated Dec 19, 2025

Package

gomod github.com/elastic/beats (Go)

Affected versions

<= 7.6.2

gomod github.com/elastic/beats/v7 (Go)

>= 7.7.0, < 8.19.9

>= 9.0.0, < 9.1.9

>= 9.2.0, < 9.2.3

< 7.0.0-alpha2.0.20251204214633-dd3af18220bf

8.19.9

9.1.9

9.2.3

7.0.0-alpha2.0.20251204214633-dd3af18220bf

Description

Published to the GitHub Advisory Database

Dec 19, 2025

Last updated

Dec 19, 2025

EPSS score

ghsa: Latest News

GHSA-83jg-m2pm-4jxj: Cowrie has a SSRF vulnerability in wget/curl emulation enabling DDoS amplification