1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
5 |
Gentoo Linux Security Advisory GLSA 200404-03 |
6 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
7 |
http://security.gentoo.org |
8 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
9 |
|
10 |
Severity: High |
11 |
Title: Tcpdump Vulnerabilities in ISAKMP Parsing |
12 |
Date: March 31, 2004 |
13 |
Bugs: #38206, #46258 |
14 |
ID: 200404-03 |
15 |
|
16 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
17 |
|
18 |
Synopsis |
19 |
======== |
20 |
|
21 |
There are multiple vulnerabilities in tcpdump and libpcap related to |
22 |
parsing of ISAKMP packets. |
23 |
|
24 |
Background |
25 |
========== |
26 |
|
27 |
Tcpdump is a program for monitoring IP network traffic. Libpcap is a |
28 |
supporting library which is responsibile for capturing packets off a |
29 |
network interface. |
30 |
|
31 |
Affected packages |
32 |
================= |
33 |
|
34 |
------------------------------------------------------------------- |
35 |
Package / Vulnerable / Unaffected |
36 |
------------------------------------------------------------------- |
37 |
net-analyzer/tcpdump <= 3.8.1 >= 3.8.3-r1 |
38 |
net-libs/libpcap <= 0.8.1-r1 >= 0.8.3-r1 |
39 |
|
40 |
Description |
41 |
=========== |
42 |
|
43 |
There are two specific vulnerabilities in tcpdump, outlined in [ |
44 |
reference 1 ]. In the first scenario, an attacker may send a |
45 |
specially-crafted ISAKMP Delete packet which causes tcpdump to read |
46 |
past the end of its buffer. In the second scenario, an attacker may |
47 |
send an ISAKMP packet with the wrong payload length, again causing |
48 |
tcpdump to read past the end of a buffer. |
49 |
|
50 |
Impact |
51 |
====== |
52 |
|
53 |
Remote attackers could potentially cause tcpdump to crash or execute |
54 |
arbitrary code as the 'pcap' user. |
55 |
|
56 |
Workaround |
57 |
========== |
58 |
|
59 |
There is no known workaround at this time. All tcpdump users are |
60 |
encouraged to upgrade to the latest available version. |
61 |
|
62 |
Resolution |
63 |
========== |
64 |
|
65 |
All tcpdump users should upgrade to the latest available version. |
66 |
ADDITIONALLY, the net-libs/libpcap package should be upgraded. |
67 |
|
68 |
# emerge sync |
69 |
|
70 |
# emerge -pv ">=net-libs/libpcap-0.8.3-r1" |
71 |
">=net-analyzer/tcpdump-3.8.3-r1" |
72 |
# emerge ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1" |
73 |
|
74 |
References |
75 |
========== |
76 |
|
77 |
[ 1 ] http://www.rapid7.com/advisories/R7-0017.html |
78 |
[ 2 ] http://rhn.redhat.com/errata/RHSA-2004-008.html |
79 |
[ 3 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989 |
80 |
|
81 |
Concerns? |
82 |
========= |
83 |
|
84 |
Security is a primary focus of Gentoo Linux and ensuring the |
85 |
confidentiality and security of our users machines is of utmost |
86 |
importance to us. Any security concerns should be addressed to |
87 |
security@g.o or alternatively, you may file a bug at |
88 |
http://bugs.gentoo.org. |
89 |
-----BEGIN PGP SIGNATURE----- |
90 |
Version: GnuPG v1.2.4 (GNU/Linux) |
91 |
|
92 |
iD8DBQFAcxHZaIxeYlQMsxsRAlw1AJ0QfdeD8WBHIvQRx03mb/vZICzkEgCgpFn1 |
93 |
YvssiEuil8dhBpwNrsDS2ag= |
94 |
=UA5P |
95 |
-----END PGP SIGNATURE----- |