Debian: tcpdump denial of service vulnerability

    Date28 Feb 2003
    CategoryDebian
    2064
    Posted ByLinuxSecurity Advisories
    An attacker is able to send a specially crafted network packet which causes tcpdump to enter an infinite loop.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 255-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    February 27th, 2003                      http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : tcpdump
    Vulnerability  : infinite loop
    Problem-Type   : remote
    Debian-specific: no
    CVE Id         : CAN-2003-0108
    
    Andrew Griffiths and iDEFENSE Labs discovered a problem in tcpdump, a
    powerful tool for network monitoring and data acquisition.  An
    attacker is able to send a specially crafted network packet which
    causes tcpdump to enter an infinite loop.
    
    In addition to the above problem the tcpdump developers discovered a
    potential infinite loop when parsing malformed BGP packets.  They also
    discovered a buffer overflow that can be exploited with certain
    malformed NFS packets.
    
    For the stable distribution (woody) these problems have been
    fixed in version 3.6.2-2.3.
    
    For the old stable distribution (potato) does not seem to be affected
    by this problem.
    
    For the unstable distribution (sid) these problems have been fixed in
    version 3.7.1-1.2.
    
    We recommend that you upgrade your tcpdump packages.
    
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3.dsc
          Size/MD5 checksum:      587 7316fea776a03291973de9db5dda34a1
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3.diff.gz
          Size/MD5 checksum:    10413 467813aab9a57869160e3082c7a11679
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz
          Size/MD5 checksum:   380635 6bc8da35f9eed4e675bfdf04ce312248
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_alpha.deb
          Size/MD5 checksum:   213570 17577dd6cbe33e486dd8b193a3f188b0
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_arm.deb
          Size/MD5 checksum:   179598 005967e88f0895d8f962f07f3db525f7
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_i386.deb
          Size/MD5 checksum:   169482 2e6aadf125c8e7bbde3d0dd162201480
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_ia64.deb
          Size/MD5 checksum:   246744 c42598c647c1380689a7e196a7f685bb
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_hppa.deb
          Size/MD5 checksum:   192974 6d2133766c5e3d2dd5d8121a55d57bed
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_m68k.deb
          Size/MD5 checksum:   157444 b20c63dca863d7e752eac1ac8089b469
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_mips.deb
          Size/MD5 checksum:   188792 07f375adc0a86d704ce12e6f50036fa8
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_mipsel.deb
          Size/MD5 checksum:   193058 46aa1ad7a702c9214e028c7f1f7bf877
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_powerpc.deb
          Size/MD5 checksum:   176780 074f39b9dcc3d4d47f73c8e2052ff91c
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_s390.deb
          Size/MD5 checksum:   174304 72e42bf4582d67d69b2f6bc84961f7db
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.3_sparc.deb
          Size/MD5 checksum:   179182 e1ebe0dec3667c68f8213827e66826fe
    
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.