RHEL 2.1 : tcpdump (RHSA-2003:033)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated tcpdump, libpcap, and arpwatch packages are available to fix
an incorrect bounds check when decoding BGP packets and a possible
denial of service.

Tcpdump is a command-line tool for monitoring network traffic.

The BGP decoding routines in tcpdump before version 3.6.2 used
incorrect bounds checking when copying data, which allows remote
attackers to cause a denial of service and possibly execute arbitrary
code (as the 'pcap' user).

If a UDP packet from a radius port contains 0 at the second byte
tcpdump gets stuck in a loop that generating an infinite stream of
'#0#0#0#0#0'. This could be used as a denial of service.

Users of tcpdump are advised to upgrade to these errata packages which
contain patches to correct thes issues.

See also :

https://www.redhat.com/security/data/cve/CVE-2002-1350.html
https://www.redhat.com/security/data/cve/CVE-2003-0093.html
http://rhn.redhat.com/errata/RHSA-2003-033.html

Solution :

Update the affected arpwatch, libpcap and / or tcpdump packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12358 ()

Bugtraq ID:

CVE ID: CVE-2002-1350
CVE-2003-0093