SUSE-SA:2003:0015: tcpdump

medium Nessus Plugin ID 13779

Synopsis

The remote host is missing a vendor-supplied security patch

Description

The remote host is missing the patch for the advisory SUSE-SA:2003:0015 (tcpdump).


The network traffic analyzer tool tcpdump is vulnerable to a denial-of- service condition while parsing ISAKMP or BGP packets. This bug can be exploited remotely by an attacker to stop the use of tcpdump for analyzing network traffic for signs of security breaches or alike.
Another bug may lead to system compromise due to the handling of malformed NFS packets send by an attacker.
Please note, that tcpdump drops root privileges right after allocating the needed raw sockets.

There is no temporary fix known.

Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update.

Solution

http://www.suse.de/security/2003_015_tcpdump.html

Plugin Details

Severity: Medium

ID: 13779

File Name: suse_SA_2003_0015.nasl

Version: 1.16

Agent: unix

Published: 7/25/2004

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2003-0108

BID: 6974