SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Tcpdump Vendors:   Tcpdump.org
(Trustix Issues Fix) Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet
SecurityTracker Alert ID:  1008743
SecurityTracker URL:  http://securitytracker.com/id/1008743
CVE Reference:   CVE-2003-0989, CVE-2004-0057   (Links to External Site)
Date:  Jan 16 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.8.1 and prior versions
Description:   Several vulnerabilities were reported in tcpdump in the processing of ISAKMP packets. A remote user can cause tcmpdump to crash or to enter an infinite loop.

It is reported that the rawprint() function in print-isakmp.c fails to validate its input arguments [CVE: CVE-2004-0057]. A remote user can send a specially crafted ISAKMP packet to cause the tcpdump process to crash. Red Hat credits Jonathan Heusser with discovering this flaw. Version 3.8.1 and prior versions are affected.

It is also reported that versions prior to 3.8.1 contain flaws that allow a remote user to force tcpdump to enter an infinite loop [CVE: CVE-2003-0989]. According to Red Hat, George Bakos discovered these flaws.

Impact:   A remote user can cause the tcpdump process to crash or to enter an endless loop.
Solution:   Trustix has released a fix, available at:

http://http.trustix.org/pub/trustix/updates/
ftp://ftp.trustix.org/pub/trustix/updates/

Users of the SWUP tool can update automatically using 'swup --upgrade'.

The MD5sums of the packages are:

3257aa70db7a0b029ac3994e951ed541 ./2.0/srpms/tcpdump-3.7.2-6tr.src.rpm
fcfa1bb108341c59937c6374127dd760 ./2.0/rpms/tcpdump-3.7.2-6tr.i586.rpm
bd28bd54a3aacb28eb4cc258ee45332c ./1.5/srpms/tcpdump-3.7.2-6tr.src.rpm
386d34545aa595839c4dd1f257b76815 ./1.5/rpms/tcpdump-3.7.2-6tr.i586.rpm

Vendor URL:  cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-isakmp.c (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  1.5, 2.0

Message History:   This archive entry is a follow-up to the message listed below.
Jan 14 2004 Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet



 Source Message Contents

Subject:  TSLSA-2004-0004 - tcpdump


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2004-0004

Package name:      tcpdump
Summary:           remote crashing bug
Date:              2004-01-15
Revision:          1
Affected versions: Trustix 1.5, 2.0

- --------------------------------------------------------------------------
Package description:
  Tcpdump is a command-line tool for monitoring network traffic.
  Tcpdump can capture and display the packet headers on a particular
  network interface or on all interfaces.  Tcpdump can display all of
  the packet headers, or just the ones that match particular criteria.


Problem description:
  A problem in tcpdump was discovered, where it was possible to crash the
  program by sending carefully crafted packets on the network.


Action:
  We recommend that all systems with this package installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All Trustix updates are available from
  <URI:http://http.trustix.org/pub/trustix/updates/>
  <URI:ftp://ftp.trustix.org/pub/trustix/updates/>


About Trustix Secure Linux:
  Trustix Secure Linux is a small Linux distribution for servers. With focus
  on security and stability, the system is painlessly kept safe and up to
  date from day one using swup, the automated software updater.


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.


Public testing:
  Most updates for Trustix are made available for public testing some time
  before release.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://tsldev.trustix.org/cloud/>

  You may also use swup for public testing of updates:
  
  site {
      class = 0
      location = "http://tsldev.trustix.org/cloud/rdfs/latest.rdf"
      regexp = ".*"
  }
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.org/support/>


Verification:
  This advisory along with all Trustix packages are signed with the
  TSL sign key.
  This key is available from:
  <URI:http://www.trustix.org/TSL-SIGN-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.org/errata/trustix-1.5/> and
  <URI:http://www.trustix.org/errata/trustix-2.0/>
  or directly at
  <URI:http://www.trustix.org/errata/misc/2004/TSL-2004-0004-tcpdump.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
3257aa70db7a0b029ac3994e951ed541  ./2.0/srpms/tcpdump-3.7.2-6tr.src.rpm
fcfa1bb108341c59937c6374127dd760  ./2.0/rpms/tcpdump-3.7.2-6tr.i586.rpm
bd28bd54a3aacb28eb4cc258ee45332c  ./1.5/srpms/tcpdump-3.7.2-6tr.src.rpm
386d34545aa595839c4dd1f257b76815  ./1.5/rpms/tcpdump-3.7.2-6tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQFABsFSi8CEzsK9IksRAtX4AJ93GqA3f/IeP2Y/fGZBS55MkZ4SgwCfcJlq
CtbzfppGDIPYeeATGUtPbeQ=
=Ec8Q
-----END PGP SIGNATURE-----
_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo/tsl-announce

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC