SUSE SLED12 / SLES12 Security Update : tcpdump (SUSE-SU-2017:2854-1)

High Nessus Plugin ID 104208

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This update for tcpdump to version 4.9.2 fixes several issues. These security issues were fixed :

- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer over-read and application crash) via crafted packet data. The crash occured in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).

- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function in print-sl.c that allowed remote DoS (bsc#1057247).

- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that allowed remote DoS (bsc#1057247)

- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c that allowed remote DoS (bsc#1057247).

- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print function in print-pim.c that allowed remote DoS (bsc#1057247).

- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12894: Prevent buffer over-read in several protocol parsers that allowed remote DoS (bsc#1057247)

- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12900: Prevent buffer over-read in the in several protocol parsers that allowed remote DoS (bsc#1057247)

- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12988: Prevent buffer over-read in the telnet parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13014: Prevent buffer over-read in the White Board protocol parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation header parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that allowed remote DoS (bsc#1057247)

- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header parser that allowed remote DoS (bsc#1057247)

- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1776=1

SUSE Linux Enterprise Server 12-SP3:zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1776=1

SUSE Linux Enterprise Server 12-SP2:zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1776=1

SUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1776=1

SUSE Linux Enterprise Desktop 12-SP2:zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1776=1

To bring your system up-to-date, use 'zypper patch'.

See Also

https://bugzilla.suse.com/show_bug.cgi?id=1047873

https://bugzilla.suse.com/show_bug.cgi?id=1057247

https://www.suse.com/security/cve/CVE-2017-11108/

https://www.suse.com/security/cve/CVE-2017-11541/

https://www.suse.com/security/cve/CVE-2017-11542/

https://www.suse.com/security/cve/CVE-2017-11543/

https://www.suse.com/security/cve/CVE-2017-12893/

https://www.suse.com/security/cve/CVE-2017-12894/

https://www.suse.com/security/cve/CVE-2017-12895/

https://www.suse.com/security/cve/CVE-2017-12896/

https://www.suse.com/security/cve/CVE-2017-12897/

https://www.suse.com/security/cve/CVE-2017-12898/

https://www.suse.com/security/cve/CVE-2017-12899/

https://www.suse.com/security/cve/CVE-2017-12900/

https://www.suse.com/security/cve/CVE-2017-12901/

https://www.suse.com/security/cve/CVE-2017-12902/

https://www.suse.com/security/cve/CVE-2017-12985/

https://www.suse.com/security/cve/CVE-2017-12986/

https://www.suse.com/security/cve/CVE-2017-12987/

https://www.suse.com/security/cve/CVE-2017-12988/

https://www.suse.com/security/cve/CVE-2017-12989/

https://www.suse.com/security/cve/CVE-2017-12990/

https://www.suse.com/security/cve/CVE-2017-12991/

https://www.suse.com/security/cve/CVE-2017-12992/

https://www.suse.com/security/cve/CVE-2017-12993/

https://www.suse.com/security/cve/CVE-2017-12994/

https://www.suse.com/security/cve/CVE-2017-12995/

https://www.suse.com/security/cve/CVE-2017-12996/

https://www.suse.com/security/cve/CVE-2017-12997/

https://www.suse.com/security/cve/CVE-2017-12998/

https://www.suse.com/security/cve/CVE-2017-12999/

https://www.suse.com/security/cve/CVE-2017-13000/

https://www.suse.com/security/cve/CVE-2017-13001/

https://www.suse.com/security/cve/CVE-2017-13002/

https://www.suse.com/security/cve/CVE-2017-13003/

https://www.suse.com/security/cve/CVE-2017-13004/

https://www.suse.com/security/cve/CVE-2017-13005/

https://www.suse.com/security/cve/CVE-2017-13006/

https://www.suse.com/security/cve/CVE-2017-13007/

https://www.suse.com/security/cve/CVE-2017-13008/

https://www.suse.com/security/cve/CVE-2017-13009/

https://www.suse.com/security/cve/CVE-2017-13010/

https://www.suse.com/security/cve/CVE-2017-13011/

https://www.suse.com/security/cve/CVE-2017-13012/

https://www.suse.com/security/cve/CVE-2017-13013/

https://www.suse.com/security/cve/CVE-2017-13014/

https://www.suse.com/security/cve/CVE-2017-13015/

https://www.suse.com/security/cve/CVE-2017-13016/

https://www.suse.com/security/cve/CVE-2017-13017/

https://www.suse.com/security/cve/CVE-2017-13018/

https://www.suse.com/security/cve/CVE-2017-13019/

https://www.suse.com/security/cve/CVE-2017-13020/

https://www.suse.com/security/cve/CVE-2017-13021/

https://www.suse.com/security/cve/CVE-2017-13022/

https://www.suse.com/security/cve/CVE-2017-13023/

https://www.suse.com/security/cve/CVE-2017-13024/

https://www.suse.com/security/cve/CVE-2017-13025/

https://www.suse.com/security/cve/CVE-2017-13026/

https://www.suse.com/security/cve/CVE-2017-13027/

https://www.suse.com/security/cve/CVE-2017-13028/

https://www.suse.com/security/cve/CVE-2017-13029/

https://www.suse.com/security/cve/CVE-2017-13030/

https://www.suse.com/security/cve/CVE-2017-13031/

https://www.suse.com/security/cve/CVE-2017-13032/

https://www.suse.com/security/cve/CVE-2017-13033/

https://www.suse.com/security/cve/CVE-2017-13034/

https://www.suse.com/security/cve/CVE-2017-13035/

https://www.suse.com/security/cve/CVE-2017-13036/

https://www.suse.com/security/cve/CVE-2017-13037/

https://www.suse.com/security/cve/CVE-2017-13038/

https://www.suse.com/security/cve/CVE-2017-13039/

https://www.suse.com/security/cve/CVE-2017-13040/

https://www.suse.com/security/cve/CVE-2017-13041/

https://www.suse.com/security/cve/CVE-2017-13042/

https://www.suse.com/security/cve/CVE-2017-13043/

https://www.suse.com/security/cve/CVE-2017-13044/

https://www.suse.com/security/cve/CVE-2017-13045/

https://www.suse.com/security/cve/CVE-2017-13046/

https://www.suse.com/security/cve/CVE-2017-13047/

https://www.suse.com/security/cve/CVE-2017-13048/

https://www.suse.com/security/cve/CVE-2017-13049/

https://www.suse.com/security/cve/CVE-2017-13050/

https://www.suse.com/security/cve/CVE-2017-13051/

https://www.suse.com/security/cve/CVE-2017-13052/

https://www.suse.com/security/cve/CVE-2017-13053/

https://www.suse.com/security/cve/CVE-2017-13054/

https://www.suse.com/security/cve/CVE-2017-13055/

https://www.suse.com/security/cve/CVE-2017-13687/

https://www.suse.com/security/cve/CVE-2017-13688/

https://www.suse.com/security/cve/CVE-2017-13689/

https://www.suse.com/security/cve/CVE-2017-13690/

https://www.suse.com/security/cve/CVE-2017-13725/

http://www.nessus.org/u?fe000485

Plugin Details

Severity: High

ID: 104208

File Name: suse_SU-2017-2854-1.nasl

Version: 3.6

Type: local

Agent: unix

Published: 2017/10/27

Updated: 2018/11/30

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:tcpdump, p-cpe:/a:novell:suse_linux:tcpdump-debuginfo, p-cpe:/a:novell:suse_linux:tcpdump-debugsource, cpe:/o:novell:suse_linux:12

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/10/26

Reference Information

CVE: CVE-2017-11108, CVE-2017-11541, CVE-2017-11542, CVE-2017-11543, CVE-2017-12893, CVE-2017-12894, CVE-2017-12895, CVE-2017-12896, CVE-2017-12897, CVE-2017-12898, CVE-2017-12899, CVE-2017-12900, CVE-2017-12901, CVE-2017-12902, CVE-2017-12985, CVE-2017-12986, CVE-2017-12987, CVE-2017-12988, CVE-2017-12989, CVE-2017-12990, CVE-2017-12991, CVE-2017-12992, CVE-2017-12993, CVE-2017-12994, CVE-2017-12995, CVE-2017-12996, CVE-2017-12997, CVE-2017-12998, CVE-2017-12999, CVE-2017-13000, CVE-2017-13001, CVE-2017-13002, CVE-2017-13003, CVE-2017-13004, CVE-2017-13005, CVE-2017-13006, CVE-2017-13007, CVE-2017-13008, CVE-2017-13009, CVE-2017-13010, CVE-2017-13011, CVE-2017-13012, CVE-2017-13013, CVE-2017-13014, CVE-2017-13015, CVE-2017-13016, CVE-2017-13017, CVE-2017-13018, CVE-2017-13019, CVE-2017-13020, CVE-2017-13021, CVE-2017-13022, CVE-2017-13023, CVE-2017-13024, CVE-2017-13025, CVE-2017-13026, CVE-2017-13027, CVE-2017-13028, CVE-2017-13029, CVE-2017-13030, CVE-2017-13031, CVE-2017-13032, CVE-2017-13033, CVE-2017-13034, CVE-2017-13035, CVE-2017-13036, CVE-2017-13037, CVE-2017-13038, CVE-2017-13039, CVE-2017-13040, CVE-2017-13041, CVE-2017-13042, CVE-2017-13043, CVE-2017-13044, CVE-2017-13045, CVE-2017-13046, CVE-2017-13047, CVE-2017-13048, CVE-2017-13049, CVE-2017-13050, CVE-2017-13051, CVE-2017-13052, CVE-2017-13053, CVE-2017-13054, CVE-2017-13055, CVE-2017-13687, CVE-2017-13688, CVE-2017-13689, CVE-2017-13690, CVE-2017-13725