Debians sikkerhedsbulletin

DSA-206-1 tcpdump -- overbelastningsangreb

Rapporteret den:
10. dec 2002
Berørte pakker:
tcpdump
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Bugtraq-databasen (hos SecurityFocus): BugTraq-id 6213.
I Mitres CVE-ordbog: CVE-2002-1350.
Yderligere oplysninger:

BGP-dekodningsrutinen i tcpdump brugte forkerte grænsekontroller ved kopiering af data. Dette kunne udnyttes ved at introducere ondsindet trafik på et "sniffet" netværk, resulterende i et overbelastningsangreb ("denial of service") mod tcpdump, eller måske endda fjern udførelse af kode.

Dette er rettet i version 3.6.2-2.2.

Rettet i:

Debian GNU/Linux 3.0 (woody)

Kildekode:
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2.dsc
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2.diff.gz
alpha (DEC Alpha):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_alpha.deb
arm (ARM):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_arm.deb
hppa (HP PA RISC):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_hppa.deb
i386 (Intel ia32):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_i386.deb
ia64 (Intel ia64):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_ia64.deb
m68k (Motorola Mc680x0):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_m68k.deb
mips (MIPS (Big Endian)):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_mips.deb
powerpc (PowerPC):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_powerpc.deb
s390 (IBM S/390):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_s390.deb
sparc (Sun SPARC/UltraSPARC):
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.