Slackware 13.37 / 14.0 / 14.1 / 14.2 / current : tcpdump (SSA:2017-205-01)

high Nessus Plugin ID 101932

Synopsis

The remote Slackware host is missing a security update.

Description

New tcpdump packages are available for Slackware 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue.

Solution

Update the affected tcpdump package.

See Also

http://www.nessus.org/u?b8de90a1

Plugin Details

Severity: High

ID: 101932

File Name: Slackware_SSA_2017-205-01.nasl

Version: 3.4

Type: local

Published: 7/25/2017

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:tcpdump, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:13.37, cpe:/o:slackware:slackware_linux:14.0, cpe:/o:slackware:slackware_linux:14.1, cpe:/o:slackware:slackware_linux:14.2

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 7/24/2017

Reference Information

CVE: CVE-2017-11108

SSA: 2017-205-01