Debian: New tcpdump packages fix arbitrary code execution

    Date11 Aug 2007
    CategoryDebian
    3820
    Posted ByLinuxSecurity Advisories
    It was discovered that an integer overflow in the BGP dissector of tcpdump, a powerful tool for network monitoring and data acquisition, may lead to the execution of arbitrary code.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1353-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Moritz Muehlenhoff
    August 11th, 2007                       http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : tcpdump
    Vulnerability  : integer overflow
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2007-3798
    
    It was discovered that an integer overflow in the BGP dissector of tcpdump,
    a powerful tool for network monitoring and data acquisition, may lead to
    the execution of arbitrary code.
    
    For the oldstable distribution (sarge) this problem has been fixed in
    version 3.8.3-5sarge3.
    
    For the stable distribution (etch) this problem has been fixed in
    version 3.9.5-2etch1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 3.9.5-3.
    
    We recommend that you upgrade your tcpdump package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3.dsc
          Size/MD5 checksum:      666 e32b72a8df4e27d5006154677c7b097b
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3.diff.gz
          Size/MD5 checksum:    12704 0e326644d730276bb4b815d9f37345d9
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3.orig.tar.gz
          Size/MD5 checksum:   567116 30645001f4b97019677cad88d3811904
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_alpha.deb
          Size/MD5 checksum:   300756 54ea3bbd5aa02d32d85c3d8faec2f549
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_amd64.deb
          Size/MD5 checksum:   256668 8139017aeae727217aef01f3d49b1f34
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_arm.deb
          Size/MD5 checksum:   250676 415be1aa1ecd70dcdb2ca2b34f090ef5
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_hppa.deb
          Size/MD5 checksum:   271786 102e5c7cc4fbe33fe4e7a8d73e2f6ff5
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_i386.deb
          Size/MD5 checksum:   238936 1d457b74f3c451d3386c0011c5d3d401
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_ia64.deb
          Size/MD5 checksum:   352630 f2b0e63005ae8d91e167e1d922d3ed63
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_m68k.deb
          Size/MD5 checksum:   216930 f369e13bd8ea6461bc4cc773bcca2bed
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_mips.deb
          Size/MD5 checksum:   259606 e9de1c9d78d968b670cb928008526d6b
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_mipsel.deb
          Size/MD5 checksum:   272276 e46bc79da49148f51bd33e75571629e3
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_powerpc.deb
          Size/MD5 checksum:   246564 4e9d753a878b422335ae6c2d9b9f16ff
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_s390.deb
          Size/MD5 checksum:   247366 5ada5e66c61bdc642efad9a13feec449
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_sparc.deb
          Size/MD5 checksum:   248204 61e64e1e06f9fec8f3bb55b9d49740ce
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1.dsc
          Size/MD5 checksum:      624 f1cb312ffc30a5f23e3b9441f1dc9816
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1.diff.gz
          Size/MD5 checksum:    11790 b142686b5c398d103060bf1c19640062
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5.orig.tar.gz
          Size/MD5 checksum:   712411 2135e7b1f09af0eaf66d2af822bed44a
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_alpha.deb
          Size/MD5 checksum:   361418 7d417c516560ae3f491e2a69a2e92852
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_amd64.deb
          Size/MD5 checksum:   315696 85ab047b978272390e321f7b82b78a54
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_arm.deb
          Size/MD5 checksum:   318102 850c71edf0435220ca82a79bdede55c3
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_hppa.deb
          Size/MD5 checksum:   334214 36e5e7720c0be0c0c65781478e690e58
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_i386.deb
          Size/MD5 checksum:   302930 8ca411b3fd819e1128aaf9cfd9e9b236
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_ia64.deb
          Size/MD5 checksum:   444780 a9d5ef9956acc9faa8d4ad239f11a212
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_mipsel.deb
          Size/MD5 checksum:   333760 7d6136acde3c46d6e4ed842d73f79e2d
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_powerpc.deb
          Size/MD5 checksum:   304530 f0711d43c19850fd71a357f063271343
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_s390.deb
          Size/MD5 checksum:   303136 95410cd0a68d9951257512962809cf84
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_sparc.deb
          Size/MD5 checksum:   309198 4e9f05bce4eee5d56bc57564ea8f79cb
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.