LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New tcpdump packages fix arbitrary code execution Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian It was discovered that an integer overflow in the BGP dissector of tcpdump, a powerful tool for network monitoring and data acquisition, may lead to the execution of arbitrary code.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1353-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
August 11th, 2007                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : tcpdump
Vulnerability  : integer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2007-3798

It was discovered that an integer overflow in the BGP dissector of tcpdump,
a powerful tool for network monitoring and data acquisition, may lead to
the execution of arbitrary code.

For the oldstable distribution (sarge) this problem has been fixed in
version 3.8.3-5sarge3.

For the stable distribution (etch) this problem has been fixed in
version 3.9.5-2etch1.

For the unstable distribution (sid) this problem has been fixed in
version 3.9.5-3.

We recommend that you upgrade your tcpdump package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3.dsc
      Size/MD5 checksum:      666 e32b72a8df4e27d5006154677c7b097b
    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3.diff.gz
      Size/MD5 checksum:    12704 0e326644d730276bb4b815d9f37345d9
    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3.orig.tar.gz
      Size/MD5 checksum:   567116 30645001f4b97019677cad88d3811904

  Alpha architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_alpha.deb
      Size/MD5 checksum:   300756 54ea3bbd5aa02d32d85c3d8faec2f549

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_amd64.deb
      Size/MD5 checksum:   256668 8139017aeae727217aef01f3d49b1f34

  ARM architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_arm.deb
      Size/MD5 checksum:   250676 415be1aa1ecd70dcdb2ca2b34f090ef5

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_hppa.deb
      Size/MD5 checksum:   271786 102e5c7cc4fbe33fe4e7a8d73e2f6ff5

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_i386.deb
      Size/MD5 checksum:   238936 1d457b74f3c451d3386c0011c5d3d401

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_ia64.deb
      Size/MD5 checksum:   352630 f2b0e63005ae8d91e167e1d922d3ed63

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_m68k.deb
      Size/MD5 checksum:   216930 f369e13bd8ea6461bc4cc773bcca2bed

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_mips.deb
      Size/MD5 checksum:   259606 e9de1c9d78d968b670cb928008526d6b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_mipsel.deb
      Size/MD5 checksum:   272276 e46bc79da49148f51bd33e75571629e3

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_powerpc.deb
      Size/MD5 checksum:   246564 4e9d753a878b422335ae6c2d9b9f16ff

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_s390.deb
      Size/MD5 checksum:   247366 5ada5e66c61bdc642efad9a13feec449

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge3_sparc.deb
      Size/MD5 checksum:   248204 61e64e1e06f9fec8f3bb55b9d49740ce


Debian GNU/Linux 4.0 alias etch
- -------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1.dsc
      Size/MD5 checksum:      624 f1cb312ffc30a5f23e3b9441f1dc9816
    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1.diff.gz
      Size/MD5 checksum:    11790 b142686b5c398d103060bf1c19640062
    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5.orig.tar.gz
      Size/MD5 checksum:   712411 2135e7b1f09af0eaf66d2af822bed44a

  Alpha architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_alpha.deb
      Size/MD5 checksum:   361418 7d417c516560ae3f491e2a69a2e92852

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_amd64.deb
      Size/MD5 checksum:   315696 85ab047b978272390e321f7b82b78a54

  ARM architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_arm.deb
      Size/MD5 checksum:   318102 850c71edf0435220ca82a79bdede55c3

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_hppa.deb
      Size/MD5 checksum:   334214 36e5e7720c0be0c0c65781478e690e58

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_i386.deb
      Size/MD5 checksum:   302930 8ca411b3fd819e1128aaf9cfd9e9b236

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_ia64.deb
      Size/MD5 checksum:   444780 a9d5ef9956acc9faa8d4ad239f11a212

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_mipsel.deb
      Size/MD5 checksum:   333760 7d6136acde3c46d6e4ed842d73f79e2d

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_powerpc.deb
      Size/MD5 checksum:   304530 f0711d43c19850fd71a357f063271343

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_s390.deb
      Size/MD5 checksum:   303136 95410cd0a68d9951257512962809cf84

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.9.5-2etch1_sparc.deb
      Size/MD5 checksum:   309198 4e9f05bce4eee5d56bc57564ea8f79cb


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Moving toward smart and secure continuous software delivery
Stealthy, Razor Thin ATM Insert Skimmers
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.