Debian Security Advisory
DSA-425-1 tcpdump -- multiple vulnerabilities
- Date Reported:
- 16 Jan 2004
- Affected Packages:
- tcpdump
- Vulnerable:
- Yes
- Security database references:
- In the Bugtraq database (at SecurityFocus): BugTraq ID 9263, BugTraq ID 9243, BugTraq ID 9507.
In Mitre's CVE dictionary: CVE-2003-1029, CVE-2003-0989, CVE-2004-0055, CVE-2004-0057.
CERT's vulnerabilities, advisories and incident notes: VU#174086, VU#955526, VU#738518. - More information:
-
Multiple vulnerabilities were discovered in tcpdump, a tool for inspecting network traffic. If a vulnerable version of tcpdump attempted to examine a maliciously constructed packet, a number of buffer overflows could be exploited to crash tcpdump, or potentially execute arbitrary code with the privileges of the tcpdump process.
- CAN-2003-1029 - infinite loop and memory consumption in processing L2TP packets
- CAN-2003-0989, CAN-2004-0057 - infinite loops in processing ISAKMP packets
- CAN-2004-0055 - segmentation fault caused by a RADIUS attribute with a large length value
For the current stable distribution (woody) these problems have been fixed in version 3.6.2-2.7.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you update your tcpdump package.
- Fixed in:
-
Debian GNU/Linux 3.0 (woody)
- Source:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7.dsc
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7.diff.gz
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_alpha.deb
- ARM:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.4_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.7_sparc.deb
MD5 checksums of the listed files are available in the original advisory.