SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Tcpdump Vendors:   Tcpdump.org
(Red Hat Issues Fix for Fedora) Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet
SecurityTracker Alert ID:  1009328
SecurityTracker URL:  http://securitytracker.com/id/1009328
CVE Reference:   CVE-2003-0989, CVE-2004-0057   (Links to External Site)
Date:  Mar 5 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.7.2
Description:   Several vulnerabilities were reported in tcpdump in the processing of ISAKMP packets. A remote user can cause tcmpdump to crash or to enter an infinite loop.

It is reported that the rawprint() function in print-isakmp.c fails to validate its input arguments [CVE: CVE-2004-0057]. A remote user can send a specially crafted ISAKMP packet to cause the tcpdump process to crash. Red Hat credits Jonathan Heusser with discovering this flaw. Version 3.8.1 and prior versions are affected.

It is also reported that versions prior to 3.8.1 contain flaws that allow a remote user to force tcpdump to enter an infinite loop [CVE: CVE-2003-0989]. According to Red Hat, George Bakos discovered these flaws.

Impact:   A remote user can cause the tcpdump process to crash or to enter an endless loop.
Solution:   Red Hat has released a fix, available at:

http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

e131fb2936e1452561d0408265e89c4c SRPMS/tcpdump-3.7.2-8.fc1.1.src.rpm
6fe3bfe8ad6cd14c479c6a277180ac3d i386/tcpdump-3.7.2-8.fc1.1.i386.rpm
3e8945207ec9852eaf3e9a2928d05795 i386/libpcap-0.7.2-8.fc1.1.i386.rpm
a8a10ea1ec625ab1b9ee01a8297daad1 i386/arpwatch-2.1a11-8.fc1.1.i386.rpm
190058abf88810e087a77f75d1d1eb64
i386/debug/tcpdump-debuginfo-3.7.2-8.fc1.1.i386.rpm

Vendor URL:  cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-isakmp.c (Links to External Site)
Cause:   Boundary error, Input validation error, State error
Underlying OS:  Linux (Red Hat Fedora)

Message History:   This archive entry is a follow-up to the message listed below.
Jan 14 2004 Tcpdump Can Be Crashed By a Remote User Sending a Malicious ISAKMP Packet



 Source Message Contents

Subject:  [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1


---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2004-091
2004-03-04
---------------------------------------------------------------------

Name        : tcpdump
Version     : 3.7.2
Release     : 8.fc1.1
Summary     : A network traffic monitoring tool.
Description :
Tcpdump is a command-line tool for monitoring network traffic.
Tcpdump can capture and display the packet headers on a particular
network interface or on all interfaces.  Tcpdump can display all of
the packet headers, or just the ones that match particular criteria.

Install tcpdump if you need a program to monitor network traffic.

---------------------------------------------------------------------
Update Information:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in
ISAKMP and RADIUS parsing.

Tcpdump is a command-line tool for monitoring network traffic.

George Bakos discovered flaws in the ISAKMP decoding routines of tcpdump
versions prior to 3.8.1. The Common Vulnerabilities and Exposures 
project (cve.mitre.org) has assigned the name CAN-2003-0989 to this issue.

Jonathan Heusser discovered an additional flaw in the ISAKMP decoding
routines for tcpdump 3.8.1 and earlier. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0057 to
this issue.

Jonathan Heusser discovered a flaw in the print_attr_string function in 
the RADIUS decoding routines for tcpdump 3.8.1 and earlier. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the 
name CAN-2004-0055 to this issue.

Remote attackers could potentially exploit these issues by sending
carefully-crafted packets to a victim. If the victim uses tcpdump, these
pakets could result in a denial of service, or possibly execute 
arbitrary code as the 'pcap' user.

Users of tcpdump are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.
---------------------------------------------------------------------
* Wed Mar 03 2004 Harald Hoyer <harald@redhat.com> - 14:3.7.2-8.fc1.1

- bumped releaseno, cause s.o. built 7.1 without cvs checkin for FC1.


---------------------------------------------------------------------
This update can be downloaded from:
   http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

e131fb2936e1452561d0408265e89c4c  SRPMS/tcpdump-3.7.2-8.fc1.1.src.rpm
6fe3bfe8ad6cd14c479c6a277180ac3d  i386/tcpdump-3.7.2-8.fc1.1.i386.rpm
3e8945207ec9852eaf3e9a2928d05795  i386/libpcap-0.7.2-8.fc1.1.i386.rpm
a8a10ea1ec625ab1b9ee01a8297daad1  i386/arpwatch-2.1a11-8.fc1.1.i386.rpm
190058abf88810e087a77f75d1d1eb64 
i386/debug/tcpdump-debuginfo-3.7.2-8.fc1.1.i386.rpm

This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.
---------------------------------------------------------------------


--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC