![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50303 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 1 FEDORA-2004-091 (tcpdump) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to tcpdump announced via advisory FEDORA-2004-091. Tcpdump is a command-line tool for monitoring network traffic. Tcpdump can capture and display the packet headers on a particular network interface or on all interfaces. Tcpdump can display all of the packet headers, or just the ones that match particular criteria. Install tcpdump if you need a program to monitor network traffic. Update Information: Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in ISAKMP and RADIUS parsing. Tcpdump is a command-line tool for monitoring network traffic. George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump versions prior to 3.8.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0989 to this issue. Jonathan Heusser discovered an additional flaw in the ISAKMP decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0057 to this issue. Jonathan Heusser discovered a flaw in the print_attr_string function in the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0055 to this issue. Remote attackers could potentially exploit these issues by sending carefully-crafted packets to a victim. If the victim uses tcpdump, these pakets could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user. Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues. 7dc3b86d8ed719068c9758d10f89c1a8 SRPMS/tcpdump-3.7.2-7.fc1.1.src.rpm 32542a5c04f6ef98a0c5bbb9d994eb65 i386/tcpdump-3.7.2-7.fc1.1.i386.rpm 3245ae55e53296a83490768b9fd682dc i386/libpcap-0.7.2-7.fc1.1.i386.rpm 1b313ff0bcd98aa579ce94a0e9b69194 i386/arpwatch-2.1a11-7.fc1.1.i386.rpm ed4460a118b6552d1a893d71b3316759 i386/debug/tcpdump-debuginfo-3.7.2-7.fc1.1.i386.rpm Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-090.shtml Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0989 http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html BugTraq ID: 9507 http://www.securityfocus.com/bid/9507 Bugtraq: 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. (Google Search) http://www.securityfocus.com/archive/1/350238/30/21640/threaded Bugtraq: 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) (Google Search) http://marc.info/?l=bugtraq&m=107577418225627&w=2 Caldera Security Advisory: CSSA-2004-008.0 ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt CERT/CC vulnerability note: VU#738518 http://www.kb.cert.org/vuls/id/738518 Debian Security Information: DSA-425 (Google Search) http://www.debian.org/security/2004/dsa-425 En Garde Linux Advisory: ESA-20040119-002 http://lwn.net/Alerts/66805/ http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:008 http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10599 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A847 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A852 http://www.redhat.com/support/errata/RHSA-2004-007.html http://www.redhat.com/support/errata/RHSA-2004-008.html SCO Security Bulletin: SCOSA-2004.9 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt http://www.securitytracker.com/id?1008716 http://secunia.com/advisories/10636 http://secunia.com/advisories/10637 http://secunia.com/advisories/10639 http://secunia.com/advisories/10644 http://secunia.com/advisories/10652 http://secunia.com/advisories/10668 http://secunia.com/advisories/10718 http://secunia.com/advisories/11022 http://secunia.com/advisories/11032/ http://secunia.com/advisories/12179/ SGI Security Advisory: 20040103-01-U ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc SGI Security Advisory: 20040202-01-U ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc SuSE Security Announcement: SuSE-SA:2004:002 (Google Search) http://lwn.net/Alerts/66445/ |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |