Beats 5.6.4 security update

Packetbeat denial of service (ESA-2017-21)

Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.

Affected Versions: All prior to 5.6.4

Solutions and Mitigations:
Users should upgrade to Packetbeat version 5.6.4. This issue can be avoided by disabling the PostgreSQL protocol.

Credit: Thanks to Teppei Fukuda for reporting this issue.

CVE ID: CVE-2017-11480