Novell is now a part of Micro Focus

Security update for tcpdump


(Last modified: 22MAY2002)

solutions Security update for tcpdump SuSE Linux Maintenance Web (3cdbfe3b93d9258086d658f660059d48)

Applies to

Product(s): SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 7 for PowerPC

Package: tcpdump
Release: 20020522
Obsoletes: none


Everyone using tcpdump should install this patch.



Problem description

Tcpdump is a command-line tool for monitoring network traffic. It uses libpcap, a library which provides a portable framework for low-level network monitoring. Both are developed by the same team.
During internal source code auditing done by FreeBSD, several overflowable buffers were discovered in the version of tcpdump included in many OS'. Some simply allow the remote attacker to crash the local tcpdump process. This is a problem for systems using tcpdump as a form of intrusion detection, as after an attacker has crashed the tcpdump process, network activity will no longer occur and may be able to cause arbitrary code to be executed as the user running tcpdump, often root.
There is a more serious vulnerability in the decoding of AFS ACL packets in tcpdump which may allow a remote attacker to execute arbitrary code on the local system (usually at root privilege, since root privilege is required to run tcpdump). Similar problem is in displaying NFS traffic, when tcpdump reliably segfaults.
Last problem is in using kernel filter: This issue occurs due to the
interaction in libpcap and the kernel implementation of
filters. When a PF_PACKET socket is created, it is bound into
the network and starts receiving packets. Packets are placed upon its
queue for pickup via recvfrom(). libpcap then binds
the socket to an interface, and then sets the filter on the socket. None
of these actions call skb_queue_purge(), which means that
packets that were put in the queue before the filter was set remain in
the queue and are picked up by libpcap, and hence


Please install the updates provided at the location noted below.

Installation notes

This update is provided as an RPM package that can easily be installed onto a running system by using this command:
rpm -Uvh tcpdump.rpm

links to download packages

Download Source Packages

Download the source code of the patches for maintained products.


The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.

Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.

© Micro Focus