Mandrake Linux Security Advisory : tcpdump (MDKSA-2004:030)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

A number of vulnerabilities were discovered in tcpdump versions prior
to 3.8.1 that, if fed a maliciously crafted packet, could be exploited
to crash tcpdump. These vulnerabilities include :

Remote attackers can cause a denial of service (crash) via ISAKMP
packets containing a Delete payload with a large number of SPI's,
which causes an out-of-bounds read. (CVE-2004-1083)

Integer underflow in the isakmp_id_print allows remote attackers to
cause a denial of service (crash) via an ISAKMP packet with an
Identification payload with a length that becomes less than 8 during
byte order conversion, which causes an out-of-bounds read.
(CVE-2004-0184)

The updated packages are patched to correct these problems.

Solution :

Update the affected tcpdump package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 14129 (mandrake_MDKSA-2004-030.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0183
CVE-2004-0184

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now