mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 14:48:21 +00:00
Fixed a bug in the vulnerable software script and added a test.
This commit is contained in:
parent
e986247ff2
commit
4bddcd2379
3 changed files with 51 additions and 10 deletions
|
@ -43,15 +43,6 @@ export {
|
||||||
|
|
||||||
global internal_vulnerable_versions: table[string] of set[VulnerableVersionRange] = table();
|
global internal_vulnerable_versions: table[string] of set[VulnerableVersionRange] = table();
|
||||||
|
|
||||||
event Control::configuration_update()
|
|
||||||
{
|
|
||||||
internal_vulnerable_versions = table();
|
|
||||||
|
|
||||||
# Copy the const vulnerable versions into the global modifiable one.
|
|
||||||
for ( sw in vulnerable_versions )
|
|
||||||
internal_vulnerable_versions[sw] = vulnerable_versions[sw];
|
|
||||||
}
|
|
||||||
|
|
||||||
function decode_vulnerable_version_range(vuln_sw: string): VulnerableVersionRange
|
function decode_vulnerable_version_range(vuln_sw: string): VulnerableVersionRange
|
||||||
{
|
{
|
||||||
# Create a max value with a dunce value only because the $max field
|
# Create a max value with a dunce value only because the $max field
|
||||||
|
@ -115,11 +106,27 @@ event grab_vulnerable_versions(i: count)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
event bro_init()
|
function update_vulnerable_sw()
|
||||||
{
|
{
|
||||||
|
internal_vulnerable_versions = table();
|
||||||
|
|
||||||
|
# Copy the const vulnerable versions into the global modifiable one.
|
||||||
|
for ( sw in vulnerable_versions )
|
||||||
|
internal_vulnerable_versions[sw] = vulnerable_versions[sw];
|
||||||
|
|
||||||
event grab_vulnerable_versions(1);
|
event grab_vulnerable_versions(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
event bro_init() &priority=3
|
||||||
|
{
|
||||||
|
update_vulnerable_sw();
|
||||||
|
}
|
||||||
|
|
||||||
|
event Control::configuration_update() &priority=3
|
||||||
|
{
|
||||||
|
update_vulnerable_sw();
|
||||||
|
}
|
||||||
|
|
||||||
event log_software(rec: Info)
|
event log_software(rec: Info)
|
||||||
{
|
{
|
||||||
if ( rec$name !in internal_vulnerable_versions )
|
if ( rec$name !in internal_vulnerable_versions )
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
#separator \x09
|
||||||
|
#set_separator ,
|
||||||
|
#empty_field (empty)
|
||||||
|
#unset_field -
|
||||||
|
#path notice
|
||||||
|
#open 2013-04-25-18-55-26
|
||||||
|
#fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p proto note msg sub src dst p n peer_descr actions suppress_for dropped remote_location.country_code remote_location.region remote_location.city remote_location.latitude remote_location.longitude metric_index.host metric_index.str metric_index.network
|
||||||
|
#types time string addr port addr port enum enum string string addr addr port count string table[enum] interval bool string string string double double addr string subnet
|
||||||
|
1366916126.685057 - - - - - - Software::Vulnerable_Version 1.2.3.4 is running Java 1.7.0.15 which is vulnerable. Java 1.7.0.15 1.2.3.4 - - - bro Notice::ACTION_LOG 3600.000000 F - - - - - - - -
|
||||||
|
1366916126.685057 - - - - - - Software::Vulnerable_Version 1.2.3.5 is running Java 1.6.0.43 which is vulnerable. Java 1.6.0.43 1.2.3.5 - - - bro Notice::ACTION_LOG 3600.000000 F - - - - - - - -
|
||||||
|
#close 2013-04-25-18-55-26
|
|
@ -0,0 +1,23 @@
|
||||||
|
# @TEST-EXEC: bro %INPUT
|
||||||
|
# @TEST-EXEC: btest-diff notice.log
|
||||||
|
|
||||||
|
@load frameworks/software/vulnerable
|
||||||
|
|
||||||
|
redef Software::asset_tracking = ALL_HOSTS;
|
||||||
|
|
||||||
|
global java_1_6_vuln: Software::VulnerableVersionRange = [$max=[$major=1,$minor=6,$minor2=0,$minor3=43]];
|
||||||
|
global java_1_7_vuln: Software::VulnerableVersionRange = [$min=[$major=1,$minor=7], $max=[$major=1,$minor=7,$minor2=0,$minor3=20]];
|
||||||
|
redef Software::vulnerable_versions += {
|
||||||
|
["Java"] = set(java_1_6_vuln, java_1_7_vuln)
|
||||||
|
};
|
||||||
|
|
||||||
|
event bro_init()
|
||||||
|
{
|
||||||
|
Software::found([$orig_h=1.2.3.4, $orig_p=1234/tcp, $resp_h=4.3.2.1, $resp_p=80/tcp],
|
||||||
|
[$name="Java", $host=1.2.3.4, $version=[$major=1, $minor=7, $minor2=0, $minor3=15]]);
|
||||||
|
Software::found([$orig_h=1.2.3.5, $orig_p=1234/tcp, $resp_h=4.3.2.1, $resp_p=80/tcp],
|
||||||
|
[$name="Java", $host=1.2.3.5, $version=[$major=1, $minor=6, $minor2=0, $minor3=43]]);
|
||||||
|
Software::found([$orig_h=1.2.3.6, $orig_p=1234/tcp, $resp_h=4.3.2.1, $resp_p=80/tcp],
|
||||||
|
[$name="Java", $host=1.2.3.6, $version=[$major=1, $minor=6, $minor2=0, $minor3=50]]);
|
||||||
|
|
||||||
|
}
|
Loading…
Add table
Add a link
Reference in a new issue