Gentoo Archives: gentoo-announce

From: Kristian Fiskerstrand <k_f@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] [ GLSA 201502-05 ] tcpdump: Multiple vulnerabilities
Date: Sat, 07 Feb 2015 20:28:23
Message-Id: 54D6704A.5050900@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201502-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: tcpdump: Multiple vulnerabilities
9 Date: February 07, 2015
10 Bugs: #534660
11 ID: 201502-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in tcpdump could result in execution of
19 arbitrary code or Denial of Service.
20
21 Background
22 ==========
23
24 tcpdump is a tool for capturing and inspecting network traffic.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-analyzer/tcpdump < 4.6.2-r1 >= 4.6.2-r1
33
34 Description
35 ===========
36
37 Multiple vulnerabilities have been discovered in tcpdump:
38
39 * The olsr_print function function contains an integer underflow error
40 (CVE-2014-8767)
41 * The geonet_print function function contains multiple integer
42 underflow errors (CVE-2014-8768)
43 * The decoder for the Ad hoc On-Demand Distance Vector protocol
44 contains an out-of-bounds memory access error (CVE-2014-8769)
45 * The ppp_hdlc function contains a buffer overflow error
46 (CVE-2014-9140)
47
48 Impact
49 ======
50
51 A remote attacker may be able to send a specially crafted packet,
52 possibly resulting in execution of arbitrary code or a Denial of
53 Service condition.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All tcpdump users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-4.6.2-r1"
67
68 References
69 ==========
70
71 [ 1 ] CVE-2014-8767
72 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8767
73 [ 2 ] CVE-2014-8768
74 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8768
75 [ 3 ] CVE-2014-8769
76 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8769
77 [ 4 ] CVE-2014-9140
78 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9140
79
80 Availability
81 ============
82
83 This GLSA and any updates to it are available for viewing at
84 the Gentoo Security Website:
85
86 http://security.gentoo.org/glsa/glsa-201502-05.xml
87
88 Concerns?
89 =========
90
91 Security is a primary focus of Gentoo Linux and ensuring the
92 confidentiality and security of our users' machines is of utmost
93 importance to us. Any security concerns should be addressed to
94 security@g.o or alternatively, you may file a bug at
95 https://bugs.gentoo.org.
96
97 License
98 =======
99
100 Copyright 2015 Gentoo Foundation, Inc; referenced text
101 belongs to its owner(s).
102
103 The contents of this document are licensed under the
104 Creative Commons - Attribution / Share Alike license.
105
106 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature