Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.50304
Category:Fedora Local Security Checks
Title:Fedora Core 1 FEDORA-2004-092 (tcpdump)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to tcpdump
announced via advisory FEDORA-2004-092.

Tcpdump is a command-line tool for monitoring network traffic.
Tcpdump can capture and display the packet headers on a particular
network interface or on all interfaces. Tcpdump can display all of
the packet headers, or just the ones that match particular criteria.

Install tcpdump if you need a program to monitor network traffic.

Update Information:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in
ISAKMP and RADIUS parsing.

Tcpdump is a command-line tool for monitoring network traffic.

George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump
versions prior to 3.8.1. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2003-0989 to this issue.

Jonathan Heusser discovered an additional flaw in the ISAKMP decoding
routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0057 to
this issue.

Jonathan Heusser discovered a flaw in the print_attr_string function in
the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0055 to this issue.

Remote attackers could potentially exploit these issues by sending
carefully-crafted packets to a victim. If the victim uses tcpdump, these
pakets could result in a denial of service, or possibly execute
arbitrary code as the 'pcap' user.

Users of tcpdump are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.
* Wed Mar 03 2004 Harald Hoyer - 14:3.7.2-8.fc1.1

- bumped releaseno, cause s.o. built 7.1 without cvs checkin for FC1.

e131fb2936e1452561d0408265e89c4c SRPMS/tcpdump-3.7.2-8.fc1.1.src.rpm
6fe3bfe8ad6cd14c479c6a277180ac3d i386/tcpdump-3.7.2-8.fc1.1.i386.rpm
3e8945207ec9852eaf3e9a2928d05795 i386/libpcap-0.7.2-8.fc1.1.i386.rpm
a8a10ea1ec625ab1b9ee01a8297daad1 i386/arpwatch-2.1a11-8.fc1.1.i386.rpm
190058abf88810e087a77f75d1d1eb64 i386/debug/tcpdump-debuginfo-3.7.2-8.fc1.1.i386.rpm

Solution: Apply the appropriate updates.
http://www.fedoranews.org/updates/FEDORA-2004-092.shtml

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0989
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html
BugTraq ID: 9507
http://www.securityfocus.com/bid/9507
Bugtraq: 20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities. (Google Search)
http://www.securityfocus.com/archive/1/350238/30/21640/threaded
Bugtraq: 20040131 [FLSA-2004:1222] Updated tcpdump resolves security vulnerabilites (resend with correct paths) (Google Search)
http://marc.info/?l=bugtraq&m=107577418225627&w=2
Caldera Security Advisory: CSSA-2004-008.0
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2004-008.0.txt
CERT/CC vulnerability note: VU#738518
http://www.kb.cert.org/vuls/id/738518
Debian Security Information: DSA-425 (Google Search)
http://www.debian.org/security/2004/dsa-425
En Garde Linux Advisory: ESA-20040119-002
http://lwn.net/Alerts/66805/
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00006.html
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00009.html
http://www.redhat.com/archives/fedora-legacy-list/2004-January/msg00726.html
http://www.mandriva.com/security/advisories?name=MDKSA-2004:008
http://www.redhat.com/archives/fedora-announce-list/2004-March/msg00015.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10599
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A847
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A852
http://www.redhat.com/support/errata/RHSA-2004-007.html
http://www.redhat.com/support/errata/RHSA-2004-008.html
SCO Security Bulletin: SCOSA-2004.9
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.9/SCOSA-2004.9.txt
http://www.securitytracker.com/id?1008716
http://secunia.com/advisories/10636
http://secunia.com/advisories/10637
http://secunia.com/advisories/10639
http://secunia.com/advisories/10644
http://secunia.com/advisories/10652
http://secunia.com/advisories/10668
http://secunia.com/advisories/10718
http://secunia.com/advisories/11022
http://secunia.com/advisories/11032/
http://secunia.com/advisories/12179/
SGI Security Advisory: 20040103-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc
SGI Security Advisory: 20040202-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
SuSE Security Announcement: SuSE-SA:2004:002 (Google Search)
http://lwn.net/Alerts/66445/
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.