Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50303
Category:Fedora Local Security Checks
Title:Fedora Core 1 FEDORA-2004-091 (tcpdump)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to tcpdump
announced via advisory FEDORA-2004-091.

Tcpdump is a command-line tool for monitoring network traffic.
Tcpdump can capture and display the packet headers on a particular
network interface or on all interfaces. Tcpdump can display all of
the packet headers, or just the ones that match particular criteria.

Install tcpdump if you need a program to monitor network traffic.

Update Information:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in
ISAKMP and RADIUS parsing.

Tcpdump is a command-line tool for monitoring network traffic.

George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump
versions prior to 3.8.1. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2003-0989 to this issue.

Jonathan Heusser discovered an additional flaw in the ISAKMP decoding
routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0057 to
this issue.

Jonathan Heusser discovered a flaw in the print_attr_string function in
the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0055 to this issue.

Remote attackers could potentially exploit these issues by sending
carefully-crafted packets to a victim. If the victim uses tcpdump, these
pakets could result in a denial of service, or possibly execute
arbitrary code as the 'pcap' user.

Users of tcpdump are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.
7dc3b86d8ed719068c9758d10f89c1a8 SRPMS/tcpdump-3.7.2-7.fc1.1.src.rpm
32542a5c04f6ef98a0c5bbb9d994eb65 i386/tcpdump-3.7.2-7.fc1.1.i386.rpm
3245ae55e53296a83490768b9fd682dc i386/libpcap-0.7.2-7.fc1.1.i386.rpm
1b313ff0bcd98aa579ce94a0e9b69194 i386/arpwatch-2.1a11-7.fc1.1.i386.rpm
ed4460a118b6552d1a893d71b3316759 i386/debug/tcpdump-debuginfo-3.7.2-7.fc1.1.i386.rpm

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-090.shtml

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0989
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html
BugTraq ID: 9507
http://www.securityfocus.com/bid/9507
Bugtraq: 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. (Google Search)
http://www.securityfocus.com/archive/1/350238/30/21640/threaded
Bugtraq: 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) (Google Search)
http://marc.info/?l=bugtraq&m=107577418225627&w=2
Caldera Security Advisory: CSSA-2004-008.0
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt
CERT/CC vulnerability note: VU#738518
http://www.kb.cert.org/vuls/id/738518
Debian Security Information: DSA-425 (Google Search)
http://www.debian.org/security/2004/dsa-425
En Garde Linux Advisory: ESA-20040119-002
http://lwn.net/Alerts/66805/
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html
http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:008
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A847
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A852
http://www.redhat.com/support/errata/RHSA-2004-007.html
http://www.redhat.com/support/errata/RHSA-2004-008.html
SCO Security Bulletin: SCOSA-2004.9
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt
http://www.securitytracker.com/id?1008716
http://secunia.com/advisories/10636
http://secunia.com/advisories/10637
http://secunia.com/advisories/10639
http://secunia.com/advisories/10644
http://secunia.com/advisories/10652
http://secunia.com/advisories/10668
http://secunia.com/advisories/10718
http://secunia.com/advisories/11022
http://secunia.com/advisories/11032/
http://secunia.com/advisories/12179/
SGI Security Advisory: 20040103-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc
SGI Security Advisory: 20040202-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
SuSE Security Announcement: SuSE-SA:2004:002 (Google Search)
http://lwn.net/Alerts/66445/
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.