Scientific Linux Security Update : tcpdump on SL5.x i386/x86_64

Medium Nessus Plugin ID 60299


The remote Scientific Linux host is missing one or more security updates.


Problem description :

Moritz Jodeit discovered a denial of service bug in the tcpdump IEEE 802.11 processing code. If a certain link type was explicitly specified, an attacker could inject a carefully crafted frame onto the IEEE 802.11 network that could crash a running tcpdump session.

An integer overflow flaw was found in tcpdump's BGP processing code.
An attacker could execute arbitrary code with the privilege of the pcap user by injecting a crafted frame onto the network.

In addition, the following bugs have been addressed :

- The arpwatch service initialization script would exit prematurely, returning an incorrect successful exit status and preventing the status command from running in case networking is not available.

- Tcpdump would not drop root privileges completely when launched with the

- -C option. This might have been abused by an attacker to gain root privileges in case a security problem was found in tcpdump. Users of tcpdump are encouraged to specify meaningful arguments to the -Z option in case they want tcpdump to write files with privileges other than of the pcap user.


Update the affected arpwatch, libpcap and / or tcpdump packages.

See Also

Plugin Details

Severity: Medium

ID: 60299

File Name: sl_20071109_tcpdump_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 2012/08/01

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Reference Information

CVE: CVE-2007-1218, CVE-2007-3798

CWE: 119, 189