Red Hat alert: Updated tcpdump packages fix various vulnerabilities

Posted by dave on Jan 15, 2004 4:23 AM EDT
Mailing list
Mail this story
Print this story

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in ISAKMP and RADIUS parsing.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------- Red Hat Security Advisory

Synopsis: Updated tcpdump packages fix various vulnerabilities Advisory ID: RHSA-2004:008-01 Issue date: 2004-01-07 Updated on: 2004-01-15 Product: Red Hat Enterprise Linux Keywords: tcpdump arpwatch buffer overflow Cross references: Obsoletes: RHSA-2003:151 CVE Names: CAN-2003-0989 CAN-2004-0055 CAN-2004-0057 - ---------------------------------------------------------------------

1. Topic:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in ISAKMP and RADIUS parsing.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux ES version 3 - i386 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Tcpdump is a command-line tool for monitoring network traffic.

George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump versions prior to 3.8.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0989 to this issue.

Jonathan Heusser discovered an additional flaw in the ISAKMP decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0057 to this issue.

Jonathan Heusser discovered a flaw in the print_attr_string function in the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0055 to this issue.

Remote attackers could potentially exploit these issues by sending carefully-crafted packets to a victim. If the victim uses tcpdump, these pakets could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user.

Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

113008 - CAN-2003-0989 tcpdump parsing overflow 113366 - CAN-2004-0055 CAN-2004-0057 Two issues found in tpcdump

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: ftp://updates.redhat.com/2.1AS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.5.src.rpm

i386: Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.5.i386.rpm Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.5.i386.rpm Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.5.i386.rpm

ia64: Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.5.ia64.rpm Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.5.ia64.rpm Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.5.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: ftp://updates.redhat.com/2.1AW/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.5.src.rpm

ia64: Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.5.ia64.rpm Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.5.ia64.rpm Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.5.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: ftp://updates.redhat.com/2.1ES/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.5.src.rpm

i386: Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.5.i386.rpm Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.5.i386.rpm Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.5.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: ftp://updates.redhat.com/2.1WS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.5.src.rpm

i386: Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.5.i386.rpm Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.5.i386.rpm Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.5.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS: ftp://updates.redhat.com/3AS/en/os/SRPMS/tcpdump-3.7.2-7.E3.1.src.rpm

i386: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.i386.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.i386.rpm

ia64: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.ia64.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.ia64.rpm

ppc: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.ppc.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.ppc.rpm

s390: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.s390.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.s390.rpm

s390x: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.s390x.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.s390x.rpm

x86_64: Available from Red Hat Network: libpcap-0.7.2-7.E3.1.x86_64.rpm Available from Red Hat Network: tcpdump-3.7.2-7.E3.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: ftp://updates.redhat.com/3ES/en/os/SRPMS/tcpdump-3.7.2-7.E3.1.src.rpm

i386: Available from Red Hat Ne



  Nav
» Read more about: Story Type: Security; Groups: Red Hat

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.