Debian: tcpdump denial of service vulnerability

    Date28 Feb 2003
    Posted ByLinuxSecurity Advisories
    An attacker is able to send a specially crafted network packet which causes tcpdump to enter an infinite loop.
    Debian Security Advisory DSA 255-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    February 27th, 2003            
    Package        : tcpdump
    Vulnerability  : infinite loop
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CAN-2003-0108
    Andrew Griffiths and iDEFENSE Labs discovered a problem in tcpdump, a
    powerful tool for network monitoring and data acquisition.  An
    attacker is able to send a specially crafted network packet which
    causes tcpdump to enter an infinite loop.
    In addition to the above problem the tcpdump developers discovered a
    potential infinite loop when parsing malformed BGP packets.  They also
    discovered a buffer overflow that can be exploited with certain
    malformed NFS packets.
    For the stable distribution (woody) these problems have been
    fixed in version 3.6.2-2.3.
    For the old stable distribution (potato) does not seem to be affected
    by this problem.
    For the unstable distribution (sid) these problems have been fixed in
    version 3.7.1-1.2.
    We recommend that you upgrade your tcpdump packages.
    Upgrade Instructions
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
      Source archives:
          Size/MD5 checksum:      587 7316fea776a03291973de9db5dda34a1
          Size/MD5 checksum:    10413 467813aab9a57869160e3082c7a11679
          Size/MD5 checksum:   380635 6bc8da35f9eed4e675bfdf04ce312248
      Alpha architecture:
          Size/MD5 checksum:   213570 17577dd6cbe33e486dd8b193a3f188b0
      ARM architecture:
          Size/MD5 checksum:   179598 005967e88f0895d8f962f07f3db525f7
      Intel IA-32 architecture:
          Size/MD5 checksum:   169482 2e6aadf125c8e7bbde3d0dd162201480
      Intel IA-64 architecture:
          Size/MD5 checksum:   246744 c42598c647c1380689a7e196a7f685bb
      HP Precision architecture:
          Size/MD5 checksum:   192974 6d2133766c5e3d2dd5d8121a55d57bed
      Motorola 680x0 architecture:
          Size/MD5 checksum:   157444 b20c63dca863d7e752eac1ac8089b469
      Big endian MIPS architecture:
          Size/MD5 checksum:   188792 07f375adc0a86d704ce12e6f50036fa8
      Little endian MIPS architecture:
          Size/MD5 checksum:   193058 46aa1ad7a702c9214e028c7f1f7bf877
      PowerPC architecture:
          Size/MD5 checksum:   176780 074f39b9dcc3d4d47f73c8e2052ff91c
      IBM S/390 architecture:
          Size/MD5 checksum:   174304 72e42bf4582d67d69b2f6bc84961f7db
      Sun Sparc architecture:
          Size/MD5 checksum:   179182 e1ebe0dec3667c68f8213827e66826fe
      These files will probably be moved into the stable distribution on
      its next revision.
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"40","type":"x","order":"1","pct":48.78,"resources":[]},{"id":"88","title":"Should be more technical","votes":"13","type":"x","order":"2","pct":15.85,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"29","type":"x","order":"3","pct":35.37,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350


    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.