![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50304 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 1 FEDORA-2004-092 (tcpdump) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to tcpdump announced via advisory FEDORA-2004-092. Tcpdump is a command-line tool for monitoring network traffic. Tcpdump can capture and display the packet headers on a particular network interface or on all interfaces. Tcpdump can display all of the packet headers, or just the ones that match particular criteria. Install tcpdump if you need a program to monitor network traffic. Update Information: Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in ISAKMP and RADIUS parsing. Tcpdump is a command-line tool for monitoring network traffic. George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump versions prior to 3.8.1. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0989 to this issue. Jonathan Heusser discovered an additional flaw in the ISAKMP decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0057 to this issue. Jonathan Heusser discovered a flaw in the print_attr_string function in the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0055 to this issue. Remote attackers could potentially exploit these issues by sending carefully-crafted packets to a victim. If the victim uses tcpdump, these pakets could result in a denial of service, or possibly execute arbitrary code as the 'pcap' user. Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues. * Wed Mar 03 2004 Harald Hoyer - bumped releaseno, cause s.o. built 7.1 without cvs checkin for FC1. e131fb2936e1452561d0408265e89c4c SRPMS/tcpdump-3.7.2-8.fc1.1.src.rpm 6fe3bfe8ad6cd14c479c6a277180ac3d i386/tcpdump-3.7.2-8.fc1.1.i386.rpm 3e8945207ec9852eaf3e9a2928d05795 i386/libpcap-0.7.2-8.fc1.1.i386.rpm a8a10ea1ec625ab1b9ee01a8297daad1 i386/arpwatch-2.1a11-8.fc1.1.i386.rpm 190058abf88810e087a77f75d1d1eb64 i386/debug/tcpdump-debuginfo-3.7.2-8.fc1.1.i386.rpm Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-092.shtml Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0989 http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html BugTraq ID: 9507 http://www.securityfocus.com/bid/9507 Bugtraq: 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. (Google Search) http://www.securityfocus.com/archive/1/350238/30/21640/threaded Bugtraq: 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) (Google Search) http://marc.info/?l=bugtraq&m=107577418225627&w=2 Caldera Security Advisory: CSSA-2004-008.0 ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt CERT/CC vulnerability note: VU#738518 http://www.kb.cert.org/vuls/id/738518 Debian Security Information: DSA-425 (Google Search) http://www.debian.org/security/2004/dsa-425 En Garde Linux Advisory: ESA-20040119-002 http://lwn.net/Alerts/66805/ http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:008 http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10599 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A847 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A852 http://www.redhat.com/support/errata/RHSA-2004-007.html http://www.redhat.com/support/errata/RHSA-2004-008.html SCO Security Bulletin: SCOSA-2004.9 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt http://www.securitytracker.com/id?1008716 http://secunia.com/advisories/10636 http://secunia.com/advisories/10637 http://secunia.com/advisories/10639 http://secunia.com/advisories/10644 http://secunia.com/advisories/10652 http://secunia.com/advisories/10668 http://secunia.com/advisories/10718 http://secunia.com/advisories/11022 http://secunia.com/advisories/11032/ http://secunia.com/advisories/12179/ SGI Security Advisory: 20040103-01-U ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc SGI Security Advisory: 20040202-01-U ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc SuSE Security Announcement: SuSE-SA:2004:002 (Google Search) http://lwn.net/Alerts/66445/ |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |