CERTA-2003-AVI-044
Vulnerability from certfr_avis - Published: - Updated:
Diverses failles concernant l'interprétation de certains protocoles par tcpdump ont été identifiées.
Description
Des paquets correspondants aux protocoles BGP (« Border Gateway Protocol »), ISAKMP (« Internet Security Association and Key Management Protocol ») ou RADIUS (authentification), spécifiquement falsifiés, peuvent bloquer tcpdump et empêcher son utilisateur de voir le trafic réseau.
Par ailleurs, un débordement de mémoire dans la gestion du protocole NFS (« Network File System ») serait exploitable pour s'emparer de l'hôte éxécutant tcpdump.
Solution
Mettre à jour en suivant les recommandations de l'éditeur :
-
Mandrake
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027 -
Debian
http://www.debian.org/security/2003/dsa-261 -
SuSE
http://www.suse.com/de/security/2003_015_tcpdump.html -
RedHat
http://rhn.redhat.com/errata/RHSA-2003-085.html -
Gentoo
http://forums.gentoo.org/viewtopic.php?t=39378 -
Trustix
http://www.trustix.net/errata/misc/2003/TSL-2003-0012-tcpdump.asc.txt -
OpenPKG
http://www.openpkg.org/security/OpenPKG-SA-2003.014-tcpdump.html -
Turbolinux
http://www.turbolinux.com/security/TLSA-2003-14.txt
Distributions Linux suivantes :
- Mandrake ;
- Debian ;
- SuSE ;
- Red Hat ;
- Gentoo ;
- Trustix ;
- OpenPKG ;
- Turbolinux.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eDistributions Linux suivantes :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eMandrake ;\u003c/LI\u003e \u003cLI\u003eDebian ;\u003c/LI\u003e \u003cLI\u003eSuSE ;\u003c/LI\u003e \u003cLI\u003eRed Hat ;\u003c/LI\u003e \u003cLI\u003eGentoo ;\u003c/LI\u003e \u003cLI\u003eTrustix ;\u003c/LI\u003e \u003cLI\u003eOpenPKG ;\u003c/LI\u003e \u003cLI\u003eTurbolinux.\u003c/LI\u003e \u003c/UL\u003e",
"content": "## Description\n\nDes paquets correspondants aux protocoles BGP (\u00ab Border Gateway Protocol\n\u00bb), ISAKMP (\u00ab Internet Security Association and Key Management Protocol\n\u00bb) ou RADIUS (authentification), sp\u00e9cifiquement falsifi\u00e9s, peuvent\nbloquer tcpdump et emp\u00eacher son utilisateur de voir le trafic r\u00e9seau.\n\nPar ailleurs, un d\u00e9bordement de m\u00e9moire dans la gestion du protocole NFS\n(\u00ab Network File System \u00bb) serait exploitable pour s\u0027emparer de l\u0027h\u00f4te\n\u00e9x\u00e9cutant tcpdump.\n\n## Solution\n\nMettre \u00e0 jour en suivant les recommandations de l\u0027\u00e9diteur :\n\n- Mandrake\n\n http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027\n\n- Debian\n\n http://www.debian.org/security/2003/dsa-261\n\n- SuSE\n\n http://www.suse.com/de/security/2003_015_tcpdump.html\n\n- RedHat\n\n http://rhn.redhat.com/errata/RHSA-2003-085.html\n\n- Gentoo\n\n http://forums.gentoo.org/viewtopic.php?t=39378\n\n- Trustix\n\n http://www.trustix.net/errata/misc/2003/TSL-2003-0012-tcpdump.asc.txt\n\n- OpenPKG\n\n http://www.openpkg.org/security/OpenPKG-SA-2003.014-tcpdump.html\n\n- Turbolinux\n\n http://www.turbolinux.com/security/TLSA-2003-14.txt\n",
"cves": [],
"links": [],
"reference": "CERTA-2003-AVI-044",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-03-13T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 SuSE.",
"revision_date": "2003-03-14T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences CVE et des distributions Red Hat, Trustix, OpenPKG et Turbolinux.",
"revision_date": "2003-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Risque de compromission avec les droits de l\u0027utilisateur (g\u00e9n\u00e9ralement root )"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Diverses failles concernant l\u0027interpr\u00e9tation de certains protocoles par\n\u003cspan class=\"textit\"\u003etcpdump\u003c/span\u003e ont \u00e9t\u00e9 identifi\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans tcpdump",
"vendor_advisories": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…