GLSA-201502-05 : tcpdump: Multiple vulnerabilities

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-201502-05
(tcpdump: Multiple vulnerabilities)

Multiple vulnerabilities have been discovered in tcpdump:
The olsr_print function function contains an integer underflow error
(CVE-2014-8767)
The geonet_print function function contains multiple integer
underflow errors (CVE-2014-8768)
The decoder for the Ad hoc On-Demand Distance Vector protocol
contains an out-of-bounds memory access error (CVE-2014-8769)
The ppp_hdlc function contains a buffer overflow error
(CVE-2014-9140)

Impact :

A remote attacker may be able to send a specially crafted packet,
possibly resulting in execution of arbitrary code or a Denial of Service
condition.

Workaround :

There is no known workaround at this time.

See also :

https://security.gentoo.org/glsa/201502-05

Solution :

All tcpdump users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/tcpdump-4.6.2-r1'

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVSS Temporal Score : 5.6
(CVSS2#E:ND/RL:OF/RC:ND)
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 81228 ()

Bugtraq ID: 71150
71153
71155
71468

CVE ID: CVE-2014-8767
CVE-2014-8768
CVE-2014-8769
CVE-2014-9140

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now