Debian Security Advisory

DSA-425-1 tcpdump -- multiple vulnerabilities

Date Reported:
16 Jan 2004
Affected Packages:
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 9263, BugTraq ID 9243, BugTraq ID 9507.
In Mitre's CVE dictionary: CVE-2003-1029, CVE-2003-0989, CVE-2004-0055, CVE-2004-0057.
CERT's vulnerabilities, advisories and incident notes: VU#174086, VU#955526, VU#738518.
More information:

Multiple vulnerabilities were discovered in tcpdump, a tool for inspecting network traffic. If a vulnerable version of tcpdump attempted to examine a maliciously constructed packet, a number of buffer overflows could be exploited to crash tcpdump, or potentially execute arbitrary code with the privileges of the tcpdump process.

For the current stable distribution (woody) these problems have been fixed in version 3.6.2-2.7.

For the unstable distribution (sid) these problems will be fixed soon.

We recommend that you update your tcpdump package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.