------------------------------------------------------------------------
Debian Security Advisory DSA-206-1                   security@debian.org 
Debian -- Security Information                          Wichert Akkerman
December 10, 2002
------------------------------------------------------------------------


Package        : tcpdump
Problem type   : incorrect bounds checking
Debian-specific: no

The BGP decoding routines for tcpdump used incorrect bounds checking
when copying data. This could be abused by introducing malicious traffic
on a sniffed network for a denial of service attack against tcpdump,
or possibly even remote code execution.

This has been fixed in version 3.6.2-2.2.


------------------------------------------------------------------------

Obtaining updates:

  By hand:
    wget URL
        will fetch the file for you.
    dpkg -i FILENAME.deb
        will install the fetched file.

  With apt:
    deb  Debian -- Security Information  stable/updates main
        added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at  Debian -- Security Information 

------------------------------------------------------------------------


Debian GNU/Linux 3.0 alias woody
--------------------------------

  Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
  powerpc, s390 and sparc.


  Source archives:

      
      Size/MD5 checksum:     1284 be78c7328fcd439fe7eedf6a54894b28
      
      Size/MD5 checksum:   380635 6bc8da35f9eed4e675bfdf04ce312248
      
      Size/MD5 checksum:     8956 a07ace8578ec5555c87cbfd1faba8ecd

  alpha architecture (DEC Alpha)

      
      Size/MD5 checksum:   213458 72603d37a351d08dfa7af4ab13e6301f

  arm architecture (ARM)

      
      Size/MD5 checksum:   179464 adb31a1747c0df1f1113454afb3a85f8

  hppa architecture (HP PA RISC)

      
      Size/MD5 checksum:   192892 28680f059cab0987ee313b672aa2edca

  i386 architecture (Intel ia32)

      
      Size/MD5 checksum:   169360 f303ec8777785c742a29469e49a9c63a

  ia64 architecture (Intel ia64)

      
      Size/MD5 checksum:   246776 889eb67d84ef3500239a1ad7a721dd9e

  m68k architecture (Motorola Mc680x0)

      
      Size/MD5 checksum:   157340 69ceb0d17d5e9ffca079b0bd7a18d489

  mips architecture (MIPS (Big Endian))

      
      Size/MD5 checksum:   188714 dbbe0d4eec80daa0f74b83c877064b87

  powerpc architecture (PowerPC)

      
      Size/MD5 checksum:   176706 5121aa3b8891d1030d1924f1328efcdf

  s390 architecture (IBM S/390)

      
      Size/MD5 checksum:   172534 1b2b2834af69c169893b5dee4b21eec3

  sparc architecture (Sun SPARC/UltraSPARC)

      
      Size/MD5 checksum:   179076 31a8382615ac8707b9346bfa9b1d615a

--
----------------------------------------------------------------------------
Debian Security team <team@security.debian.org> 
Debian -- Security Information 
Mailing-List: debian-security-announce@lists.debian.org


Debian: tcpdump incorrect bounds checking vulnerability

December 11, 2002
The BGP decoding routines for tcpdump used incorrect bounds checking when copying data

Summary

Package : tcpdump
Problem type : incorrect bounds checking
Debian-specific: no

The BGP decoding routines for tcpdump used incorrect bounds checking
when copying data. This could be abused by introducing malicious traffic
on a sniffed network for a denial of service attack against tcpdump,
or possibly even remote code execution.

This has been fixed in version 3.6.2-2.2.


------------------------------------------------------------------------

Obtaining updates:

By hand:
wget URL
will fetch the file for you.
dpkg -i FILENAME.deb
will install the fetched file.

With apt:
deb Debian -- Security Information stable/updates main
added to /etc/apt/sources.list will provide security updates

Additional information can be found on the Debian security webpages
at Debian -- Security Information

------------------------------------------------------------------------


Debian GNU/Linux 3.0 alias woody
--------------------------------

Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel,
powerpc, s390 and sparc.


Source archives:


Size/MD5 checksum: 1284 be78c7328fcd439fe7eedf6a54894b28

Size/MD5 checksum: 380635 6bc8da35f9eed4e675bfdf04ce312248

Size/MD5 checksum: 8956 a07ace8578ec5555c87cbfd1faba8ecd

alpha architecture (DEC Alpha)


Size/MD5 checksum: 213458 72603d37a351d08dfa7af4ab13e6301f

arm architecture (ARM)


Size/MD5 checksum: 179464 adb31a1747c0df1f1113454afb3a85f8

hppa architecture (HP PA RISC)


Size/MD5 checksum: 192892 28680f059cab0987ee313b672aa2edca

i386 architecture (Intel ia32)


Size/MD5 checksum: 169360 f303ec8777785c742a29469e49a9c63a

ia64 architecture (Intel ia64)


Size/MD5 checksum: 246776 889eb67d84ef3500239a1ad7a721dd9e

m68k architecture (Motorola Mc680x0)


Size/MD5 checksum: 157340 69ceb0d17d5e9ffca079b0bd7a18d489

mips architecture (MIPS (Big Endian))


Size/MD5 checksum: 188714 dbbe0d4eec80daa0f74b83c877064b87

powerpc architecture (PowerPC)


Size/MD5 checksum: 176706 5121aa3b8891d1030d1924f1328efcdf

s390 architecture (IBM S/390)


Size/MD5 checksum: 172534 1b2b2834af69c169893b5dee4b21eec3

sparc architecture (Sun SPARC/UltraSPARC)


Size/MD5 checksum: 179076 31a8382615ac8707b9346bfa9b1d615a

--
----------------------------------------------------------------------------
Debian Security team <team@security.debian.org>
Debian -- Security Information
Mailing-List: debian-security-announce@lists.debian.org




Severity

Related News