openSUSE Security Update : tcpdump (openSUSE-2015-146)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

tcpdump was updated to fix three security issues.

These security issues were fixed :

- CVE-2014-8767: Integer underflow in the olsr_print
function in tcpdump 3.9.6 through 4.6.2, when in verbose
mode, allowed remote attackers to cause a denial of
service (crash) via a crafted length value in an OLSR
frame (bnc#905870 905871).

- CVE-2014-8769: tcpdump 3.8 through 4.6.2 might allowed
remote attackers to obtain sensitive information from
memory or cause a denial of service (packet loss or
segmentation fault) via a crafted Ad hoc On-Demand
Distance Vector (AODV) packet, which triggers an
out-of-bounds memory access (bnc#905871 905872).

- CVE-2014-8768: Multiple Integer underflows in the
geonet_print function in tcpdump 4.5.0 through 4.6.2,
when in verbose mode, allowed remote attackers to cause
a denial of service (segmentation fault and crash) via a
crafted length value in a Geonet frame (bnc#905871).

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=905870
https://bugzilla.opensuse.org/show_bug.cgi?id=905871
https://bugzilla.opensuse.org/show_bug.cgi?id=905872

Solution :

Update the affected tcpdump packages.

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 81371 ()

Bugtraq ID:

CVE ID: CVE-2014-8767
CVE-2014-8768
CVE-2014-8769

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now