security/zeek: Update to 5.0.6
https://github.com/zeek/zeek/releases/tag/v5.0.6
This release fixes the following potential DoS vulnerabilities:
- A missing field in the SMB FSControl script-land record could cause a heap buffer overflow when receiving packets containing those header types.
- Receiving a series of packets that start with HTTP/1.0 and then switch to HTTP/0.9 could cause Zeek to spend a large amount of time processing the packets.
- Receiving large numbers of FTP commands sequentially from the network with bad data in them could cause Zeek to spend a large amount of time processing the packets, and generate a large amount of events.
This release fixes the following bugs:
- Zeek could throw a scripting error when receiving SMB1 packets containing connect_andx_response messages prior to receiving an associated request.
- A performance regression from 4.2 to 5.0 when reading pcap files related to Broker's internal clock was fixed.
- Notices created for files transferred over multiple connections will now be associated with one of the connections rather than none.
- A new file_over_new_connection event was added to the Intel framework, for use when receiving files over established connections (for example, HTTP).
- The error message returned when trying use invalid enums in scripts now correctly includes the script location.
Reported by: Tim Wojtulewicz
Security: 2b5fc9c4-eaca-46e0-83d0-9b10c51c4b1b
(cherry picked from commit 85faac2f4c4a9a545a15ffb797ecb41ea3d985e5)