Headline
GHSA-2mj3-6grc-px38: Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration
Improper Validation of Specified Index, Position, or Offset in Input (CWE-1285) in Filebeat Syslog parser and the Libbeat Dissect processor can allow a user to trigger a Buffer Overflow (CAPEC-100) and cause a denial of service (panic/crash) of the Filebeat process via either a malformed Syslog message or a malicious tokenizer pattern in the Dissect configuration.
Skip to content
Navigation Menu
AI CODE CREATION
GitHub CopilotWrite better code with AI
GitHub SparkBuild and deploy intelligent apps
GitHub ModelsManage and compare prompts
MCP RegistryNewIntegrate external tools
View all features
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-68383
Filebeat Beats has Buffer Overflow via Malformed Syslog Message or Malicious Tokenizer Pattern in Dissect Configuration
Moderate severity GitHub Reviewed Published Dec 19, 2025 to the GitHub Advisory Database • Updated Dec 19, 2025
Package
gomod github.com/elastic/beats (Go)
Affected versions
<= 7.6.2
gomod github.com/elastic/beats/v7 (Go)
>= 7.7.0, < 8.19.9
>= 9.0.0, < 9.1.9
>= 9.2.0, < 9.2.3
< 7.0.0-alpha2.0.20251204214633-dd3af18220bf
8.19.9
9.1.9
9.2.3
7.0.0-alpha2.0.20251204214633-dd3af18220bf
Description
Published to the GitHub Advisory Database
Dec 19, 2025
Last updated
Dec 19, 2025
EPSS score