Mandrake Linux Security Advisory : tcpdump (MDKSA-2002:032)

high Nessus Plugin ID 13938

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

Several buffer overflows were found in the tcpdump package by FreeBSD developers during a code audit, in versions prior to 3.5. However, newer versions of tcpdump, including 3.6.2, are also vulnerable to another buffer overflow in the AFS RPC decoding functions, which was discovered by Nick Cleaton. These vulnerabilities could be used by a remote attacker to crash the the tcpdump process or possibly even be exploited to execute arbitrary code as the user running tcpdump, which is usually root.

The newer libpcap 0.6 has also been audited to make it more safe by implementing better buffer boundary checks in several functions.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?8a0a3b08

http://www.ciac.org/ciac/bulletins/l-015.shtml

Plugin Details

Severity: High

ID: 13938

File Name: mandrake_MDKSA-2002-032.nasl

Version: 1.16

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:libpcap, p-cpe:/a:mandriva:linux:libpcap-devel, p-cpe:/a:mandriva:linux:libpcap0, p-cpe:/a:mandriva:linux:libpcap0-devel, p-cpe:/a:mandriva:linux:tcpdump, cpe:/o:mandrakesoft:mandrake_linux:7.1, cpe:/o:mandrakesoft:mandrake_linux:7.2, cpe:/o:mandrakesoft:mandrake_linux:8.0, cpe:/o:mandrakesoft:mandrake_linux:8.1, cpe:/o:mandrakesoft:mandrake_linux:8.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 5/16/2002

Reference Information

CVE: CVE-2001-1279

MDKSA: 2002:032