openSUSE Security Update : tcpdump (openSUSE-2019-2344)

critical Nessus Plugin ID 130083

Language:

New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for tcpdump fixes the following issues :

- CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print and lookup_emem (bsc#1068716 bsc#1153098).

- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).

- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).

- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).

- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).

- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).

- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).

- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).

- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).

- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).

- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).

- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).

- CVE-2018-14470: Fixed a buffer over-read in print-babel.c:babel_print_v2 (bsc#1153098).

- CVE-2018-14879: Fixed a buffer overflow in the command-line argument parser (bsc#1153098).

- CVE-2018-14880: Fixed a buffer over-read in the OSPFv3 parser (bsc#1153098).

- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).

- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).

- CVE-2018-16227: Fixed a buffer over-read in the IEEE 802.11 parser in print-802_11.c for the Mesh Flags subfield (bsc#1153098).

- CVE-2018-16228: Fixed a buffer over-read in the HNCP parser (bsc#1153098).

- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).

- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).

- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).

- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).

- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).

- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).

- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).

- CVE-2019-15167: Fixed a vulnerability in VRRP (bsc#1153098).

This update was imported from the SUSE:SLE-15:Update update project.

Solution

Update the affected tcpdump packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1068716

https://bugzilla.opensuse.org/show_bug.cgi?id=1153332

https://bugzilla.opensuse.org/show_bug.cgi?id=1153098

Plugin Details

Severity: Critical

ID: 130083

File Name: openSUSE-2019-2344.nasl

Version: 1.5

Type: local

Agent: unix

Published: 10/21/2019

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:novell:opensuse:15.0:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:tcpdump:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:tcpdump-debuginfo:*:*:*:*:*:*:*, p-cpe:2.3:a:novell:opensuse:tcpdump-debugsource:*:*:*:*:*:*:*

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/20/2019

Vulnerability Publication Date: 11/13/2017

Reference Information

CVE: CVE-2017-16808, CVE-2019-1010220, CVE-2018-10103, CVE-2018-10105, CVE-2018-14461, CVE-2018-14462, CVE-2018-14463, CVE-2018-14464, CVE-2018-14465, CVE-2018-14466, CVE-2018-14467, CVE-2018-14468, CVE-2018-14469, CVE-2018-14470, CVE-2018-14879, CVE-2018-14880, CVE-2018-14881, CVE-2018-14882, CVE-2018-16227, CVE-2018-16228, CVE-2018-16229, CVE-2018-16230, CVE-2018-16300, CVE-2018-16301, CVE-2018-16451, CVE-2018-16452, CVE-2019-15166, CVE-2019-15167