Mandrake: 'tcpdump' buffer overflow
Posted by LinuxSecurity.com Team   
Mandrake A number of remote buffer overflows were discovered in the tcpdump package that would allow a remote attack of the local tcpdump process.

________________________________________________________________________

                Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name:           tcpdump
Date:                   June 13th, 2001
Advisory ID:            MDKSA-2001:056

Affected versions:      7.1, 7.2, 8.0, Corporate Server 1.0.1,
                        Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

 A number of remote buffer overflows were discovered in the tcpdump
 package that would allow a remote attack of the local tcpdump process.
 Intrusion detection using tcpdump would no longer be useful due to the
 attack stoping all network activity on the system.  As well, this new
 version of tcpdump fixes the vulnerability with decoding AFS ACL
 packets which would allow a remote attacker to run arbitrary code on
 the local system with root privilege.
________________________________________________________________________

References:
  www.ciac.org/ciac/bulletins/l-015.shtml
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Mandrake Linux Security Team at
   http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 7.1:
c8fe383f342db8606260542467d3e07f  7.1/RPMS/tcpdump-3.6.2-1.2mdk.i586.rpm
6674b50123f67f5726dace651ee56e40  7.1/SRPMS/tcpdump-3.6.2-1.2mdk.src.rpm

Linux-Mandrake 7.2:
a1439b909ba27750442eebbbee5e08df  7.2/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm
645e03ddc0b4460408d520f60cf717be  7.2/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm

Mandrake Linux 8.0:
80b8a68f8e39611ae50d51fe687abe40  8.0/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm
645e03ddc0b4460408d520f60cf717be  8.0/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm

Corporate Server 1.0.1:
c8fe383f342db8606260542467d3e07f  1.0.1/RPMS/tcpdump-3.6.2-1.2mdk.i586.rpm
6674b50123f67f5726dace651ee56e40  1.0.1/SRPMS/tcpdump-3.6.2-1.2mdk.src.rpm

Single Network Firewall 7.2:
a1439b909ba27750442eebbbee5e08df  snf7.2/RPMS/tcpdump-3.6.2-1.1mdk.i586.rpm
645e03ddc0b4460408d520f60cf717be  snf7.2/SRPMS/tcpdump-3.6.2-1.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:

   http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Mandrake Linux 8.0, look for it in "updates/8.0/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other security advisories for Mandrake Linux at:

   http://www.linux-mandrake.com/en/security/

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
________________________________________________________________________

Mandrake Linux has two security-related mailing list services that
anyone can subscribe to:

security-announce@linux-mandrake.com

  Mandrake Linux's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.

security-discuss@linux-mandrake.com

  Mandrake Linux's security discussion mailing list.  This list is open
  to anyone to discuss Mandrake Linux security specifically and Linux
  security in general.

To subscribe to either list, send a message to
  sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
  sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
  sympa@linux-mandrake.com
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:

   http://www.linux-mandrake.com/en/flists.php3#security
________________________________________________________________________