Zeek Network Security Monitor v3.2.4 releases: powerful network analysis framework
Zeek Network Security Monitor
Zeek is a powerful framework for network analysis and security monitoring. It is a powerful system that on top of the functionality it provides out of the box, also offers the flexibility to customize analysis pretty much arbitrarily
Zeek’s domain-specific scripting language enables site-specific monitoring policies.
Zeek targets high-performance networks and is used operationally at a variety of large sites.
Zeek is not restricted to any particular detection approach and does not rely on traditional signatures.
Zeek comprehensively logs what it sees and provides a high-level archive of a network’s activity.
Zeek comes with analyzers for many protocols, enabling high-level semantic analysis at the application layer.
Zeek keeps extensive application-layer state about the network it monitors.
Zeek interfaces with other applications for real-time exchange of information.
Zeek comes with a BSD license, allowing for free use with virtually no restrictions.
While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 20 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally by both major companies and numerous many educational and scientific institutions for securing their cyberinfrastructure.
Zeek was originally developed by Vern Paxson. Robin Sommer now leads the project, jointly with a core team of researchers and developers at the International Computer Science Institute in Berkeley, CA; and the National Center for Supercomputing Applications in Urbana-Champaign, IL.
Zeek v3.2.4 releases.
This release fixes the following security issues:
- Fix ASCII Input reader’s treatment of input files containing null-bytes
This is mostly only significant for deployments that utilize input data feeds
whose content is controlled by external sources: an input file containing
null-bytes could lead to a buffer-over-read, crash Zeek, and be exploited
to cause Denial of Service.
This release fixes the following bugs:
- MIME sub-entities overwrote top-level header values cause misleading SMTP log
- Fix incorrect
Reminder: Zeek 3.0.x is the Long-Term Support (LTS) release, receiving bug fixes until at least May 2021 (estimate of 2 months after 4.0.0 release) while Zeek 3.2.x is the current feature release, receiving bug fixes until approximately March 2021 when the next 4.0.x LTS release series is expected to begin.
Copyright (c) 1995-2016, The Regents of the University of California through the Lawrence Berkeley National Laboratory and the International Computer Science Institute. All rights reserved.