This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote Mandriva Linux host is missing a security update.
Updated tcpdump package fixes security vulnerabilities :
The Tcpdump program could crash when processing a malformed OLSR
payload when the verbose output flag was set (CVE-2014-8767).
The application decoder for the Ad hoc On-Demand Distance Vector
(AODV) protocol in Tcpdump fails to perform input validation and
performs unsafe out-of-bound accesses. The application will usually
not crash, but perform out-of-bounds accesses and output/leak larger
amounts of invalid data, which might lead to dropped packets. It is
unknown if a payload exists that might trigger segfaults
It was discovered that tcpdump incorrectly handled printing PPP
packets. A remote attacker could use this issue to cause tcpdump to
crash, resulting in a denial of service, or possibly execute arbitrary
See also :
Update the affected tcpdump package.
Risk factor :
Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.6
Public Exploit Available : false