Date:         Fri, 9 Nov 2007 16:31:36 -0600
Reply-To:     Connie Sieh 
Sender:       Security Errata for Scientific Linux
              
From:         Connie Sieh 
Subject:      Security ERRATA for tcpdump on SL5.x i386/x86_64
Comments: To: scientific 

Synopsis:          Moderate: tcpdump security and bug fix update

CVE Names:         CVE-2007-1218
 		   CVE-2007-3798

Problem description:

Moritz Jodeit discovered a denial of service bug in the tcpdump IEEE 802.11
processing code. If a certain link type was explicitly specified, an
attacker could inject a carefully crafted frame onto the IEEE 802.11
network that could crash a running tcpdump session. (CVE-2007-1218)

An integer overflow flaw was found in tcpdump's BGP processing code. An
attacker could execute arbitrary code with the privilege of the pcap user
by injecting a crafted frame onto the network. (CVE-2007-3798)

In addition, the following bugs have been addressed:

* The arpwatch service initialization script would exit prematurely,
returning an incorrect successful exit status and preventing the status
command from running in case networking is not available.

* Tcpdump would not drop root privileges completely when launched with the
- -C option. This might have been abused by an attacker to gain root
privileges in case a security problem was found in tcpdump. Users of
tcpdump are encouraged to specify meaningful arguments to the -Z option in
case they want tcpdump to write files with privileges other than of the
pcap user.

SL5.x

SRPMS:
 	tcpdump-3.9.4-11.el5.src.rpm

i386:
 	arpwatch-2.1a13-18.el5.i386.rpm
 	libpcap-0.9.4-11.el5.i386.rpm
 	tcpdump-3.9.4-11.el5.i386.rpm

x86_64:
 	arpwatch-2.1a13-18.el5.x86_64.rpm
 	libpcap-0.9.4-11.el5.i386.rpm
 	libpcap-0.9.4-11.el5.x86_64.rpm
 	tcpdump-3.9.4-11.el5.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-1218 tcpdump SL5.x i386/x86_64

Moderate: tcpdump security and bug fix update

Summary

Date:         Fri, 9 Nov 2007 16:31:36 -0600Reply-To:     Connie Sieh Sender:       Security Errata for Scientific Linux              From:         Connie Sieh Subject:      Security ERRATA for tcpdump on SL5.x i386/x86_64Comments: To: scientific Synopsis:          Moderate: tcpdump security and bug fix updateCVE Names:         CVE-2007-1218 		   CVE-2007-3798Problem description:Moritz Jodeit discovered a denial of service bug in the tcpdump IEEE 802.11processing code. If a certain link type was explicitly specified, anattacker could inject a carefully crafted frame onto the IEEE 802.11network that could crash a running tcpdump session. (CVE-2007-1218)An integer overflow flaw was found in tcpdump's BGP processing code. Anattacker could execute arbitrary code with the privilege of the pcap userby injecting a crafted frame onto the network. (CVE-2007-3798)In addition, the following bugs have been addressed:* The arpwatch service initialization script would exit prematurely,returning an incorrect successful exit status and preventing the statuscommand from running in case networking is not available.* Tcpdump would not drop root privileges completely when launched with the- -C option. This might have been abused by an attacker to gain rootprivileges in case a security problem was found in tcpdump. Users oftcpdump are encouraged to specify meaningful arguments to the -Z option incase they want tcpdump to write files with privileges other than of thepcap user.SL5.xSRPMS: 	tcpdump-3.9.4-11.el5.src.rpmi386: 	arpwatch-2.1a13-18.el5.i386.rpm 	libpcap-0.9.4-11.el5.i386.rpm 	tcpdump-3.9.4-11.el5.i386.rpmx86_64: 	arpwatch-2.1a13-18.el5.x86_64.rpm 	libpcap-0.9.4-11.el5.i386.rpm 	libpcap-0.9.4-11.el5.x86_64.rpm 	tcpdump-3.9.4-11.el5.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News