NewStart CGSL CORE 5.04 / MAIN 5.04 : tcpdump Multiple Vulnerabilities (NS-SA-2019-0071)

critical Nessus Plugin ID 127275

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has tcpdump packages installed that are affected by multiple vulnerabilities:

- The IPv6 routing header parser in tcpdump before 4.9.2 has a buffer over-read in print-rt6.c:rt6_print().
(CVE-2017-12986, CVE-2017-13725)

- tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol. (CVE-2017-11108)

- tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c. (CVE-2017-11541)

- tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c.
(CVE-2017-11542)

- tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c. (CVE-2017-11543)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL tcpdump packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

http://security.gd-linux.com/info/CVE-2017-12893

http://security.gd-linux.com/info/CVE-2017-12894

http://security.gd-linux.com/info/CVE-2017-12895

http://security.gd-linux.com/info/CVE-2017-12896

http://security.gd-linux.com/info/CVE-2017-12897

http://security.gd-linux.com/info/CVE-2017-12898

http://security.gd-linux.com/info/CVE-2017-12899

http://security.gd-linux.com/info/CVE-2017-12900

http://security.gd-linux.com/info/CVE-2017-12901

http://security.gd-linux.com/info/CVE-2017-12902

http://security.gd-linux.com/info/CVE-2017-12985

http://security.gd-linux.com/info/CVE-2017-12986

http://security.gd-linux.com/info/CVE-2017-12987

http://security.gd-linux.com/info/CVE-2017-12988

http://security.gd-linux.com/info/CVE-2017-12989

http://security.gd-linux.com/info/CVE-2017-12990

http://security.gd-linux.com/info/CVE-2017-12991

http://security.gd-linux.com/info/CVE-2017-12992

http://security.gd-linux.com/info/CVE-2017-12993

http://security.gd-linux.com/info/CVE-2017-12994

http://security.gd-linux.com/info/CVE-2017-12995

http://security.gd-linux.com/info/CVE-2017-12996

http://security.gd-linux.com/info/CVE-2017-12997

http://security.gd-linux.com/info/CVE-2017-12998

http://security.gd-linux.com/info/CVE-2017-12999

http://security.gd-linux.com/info/CVE-2017-13000

http://security.gd-linux.com/info/CVE-2017-13001

http://security.gd-linux.com/info/CVE-2017-13002

http://security.gd-linux.com/info/CVE-2017-13003

http://security.gd-linux.com/info/CVE-2017-13004

http://security.gd-linux.com/info/CVE-2017-13005

http://security.gd-linux.com/info/CVE-2017-13006

http://security.gd-linux.com/info/CVE-2017-13007

http://security.gd-linux.com/info/CVE-2017-13008

http://security.gd-linux.com/info/CVE-2017-13009

http://security.gd-linux.com/info/CVE-2017-13010

http://security.gd-linux.com/info/CVE-2017-13011

http://security.gd-linux.com/info/CVE-2017-13012

http://security.gd-linux.com/info/CVE-2017-13013

http://security.gd-linux.com/info/CVE-2017-13014

http://security.gd-linux.com/info/CVE-2017-13015

http://security.gd-linux.com/info/CVE-2017-13016

http://security.gd-linux.com/info/CVE-2017-13017

http://security.gd-linux.com/info/CVE-2017-13018

http://security.gd-linux.com/info/CVE-2017-13019

http://security.gd-linux.com/info/CVE-2017-13020

http://security.gd-linux.com/info/CVE-2017-13021

http://security.gd-linux.com/info/CVE-2017-13022

http://security.gd-linux.com/info/CVE-2017-13023

http://security.gd-linux.com/info/CVE-2017-13024

http://security.gd-linux.com/info/CVE-2017-13025

http://security.gd-linux.com/info/CVE-2017-13026

http://security.gd-linux.com/info/CVE-2017-13027

http://security.gd-linux.com/info/CVE-2017-13028

http://security.gd-linux.com/info/CVE-2017-13029

http://security.gd-linux.com/info/CVE-2017-13030

http://security.gd-linux.com/info/CVE-2017-13031

http://security.gd-linux.com/info/CVE-2017-13032

http://security.gd-linux.com/info/CVE-2017-13033

http://security.gd-linux.com/info/CVE-2017-13034

http://security.gd-linux.com/info/CVE-2017-13035

http://security.gd-linux.com/info/CVE-2017-13036

http://security.gd-linux.com/info/CVE-2017-13037

http://security.gd-linux.com/info/CVE-2017-13038

http://security.gd-linux.com/info/CVE-2017-13039

http://security.gd-linux.com/info/CVE-2017-13040

http://security.gd-linux.com/info/CVE-2017-13041

http://security.gd-linux.com/info/CVE-2017-13042

http://security.gd-linux.com/info/CVE-2017-13043

http://security.gd-linux.com/info/CVE-2017-13044

http://security.gd-linux.com/info/CVE-2017-13045

http://security.gd-linux.com/info/CVE-2017-13046

http://security.gd-linux.com/info/CVE-2017-13047

http://security.gd-linux.com/info/CVE-2017-13048

http://security.gd-linux.com/info/CVE-2017-13049

http://security.gd-linux.com/info/CVE-2017-13050

http://security.gd-linux.com/info/CVE-2017-13051

http://security.gd-linux.com/info/CVE-2017-13052

http://security.gd-linux.com/info/CVE-2017-13053

http://security.gd-linux.com/info/CVE-2017-13054

http://security.gd-linux.com/info/CVE-2017-13055

http://security.gd-linux.com/info/CVE-2017-13687

http://security.gd-linux.com/info/CVE-2017-13688

http://security.gd-linux.com/info/CVE-2017-13689

http://security.gd-linux.com/info/CVE-2017-13690

http://security.gd-linux.com/info/CVE-2017-13725

http://security.gd-linux.com/notice/NS-SA-2019-0071

http://security.gd-linux.com/info/CVE-2017-11108

http://security.gd-linux.com/info/CVE-2017-11541

http://security.gd-linux.com/info/CVE-2017-11542

http://security.gd-linux.com/info/CVE-2017-11543

http://security.gd-linux.com/info/CVE-2017-11544

Plugin Details

Severity: Critical

ID: 127275

File Name: newstart_cgsl_NS-SA-2019-0071_tcpdump.nasl

Version: 1.6

Type: local

Published: 8/12/2019

Updated: 9/24/2025

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-13725

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_main:tcpdump, p-cpe:/a:zte:cgsl_core:tcpdump, cpe:/o:zte:cgsl_main:5, cpe:/o:zte:cgsl_core:5, p-cpe:/a:zte:cgsl_core:tcpdump-debuginfo, p-cpe:/a:zte:cgsl_main:tcpdump-debuginfo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/17/2019

Vulnerability Publication Date: 7/8/2017

Reference Information

CVE: CVE-2017-11108, CVE-2017-11541, CVE-2017-11542, CVE-2017-11543, CVE-2017-12893, CVE-2017-12894, CVE-2017-12895, CVE-2017-12896, CVE-2017-12897, CVE-2017-12898, CVE-2017-12899, CVE-2017-12900, CVE-2017-12901, CVE-2017-12902, CVE-2017-12985, CVE-2017-12986, CVE-2017-12987, CVE-2017-12988, CVE-2017-12989, CVE-2017-12990, CVE-2017-12991, CVE-2017-12992, CVE-2017-12993, CVE-2017-12994, CVE-2017-12995, CVE-2017-12996, CVE-2017-12997, CVE-2017-12998, CVE-2017-12999, CVE-2017-13000, CVE-2017-13001, CVE-2017-13002, CVE-2017-13003, CVE-2017-13004, CVE-2017-13005, CVE-2017-13006, CVE-2017-13007, CVE-2017-13008, CVE-2017-13009, CVE-2017-13010, CVE-2017-13011, CVE-2017-13012, CVE-2017-13013, CVE-2017-13014, CVE-2017-13015, CVE-2017-13016, CVE-2017-13017, CVE-2017-13018, CVE-2017-13019, CVE-2017-13020, CVE-2017-13021, CVE-2017-13022, CVE-2017-13023, CVE-2017-13024, CVE-2017-13025, CVE-2017-13026, CVE-2017-13027, CVE-2017-13028, CVE-2017-13029, CVE-2017-13030, CVE-2017-13031, CVE-2017-13032, CVE-2017-13033, CVE-2017-13034, CVE-2017-13035, CVE-2017-13036, CVE-2017-13037, CVE-2017-13038, CVE-2017-13039, CVE-2017-13040, CVE-2017-13041, CVE-2017-13042, CVE-2017-13043, CVE-2017-13044, CVE-2017-13045, CVE-2017-13046, CVE-2017-13047, CVE-2017-13048, CVE-2017-13049, CVE-2017-13050, CVE-2017-13051, CVE-2017-13052, CVE-2017-13053, CVE-2017-13054, CVE-2017-13055, CVE-2017-13687, CVE-2017-13688, CVE-2017-13689, CVE-2017-13690, CVE-2017-13725