Security update for tcpdump
(Last modified: 22MAY2002)
solutions Security update for tcpdump SuSE Linux Maintenance Web (3cdbfe3b93d9258086d658f660059d48)
SuSE Linux Enterprise Server 7 for PowerPC
During internal source code auditing done by FreeBSD, several overflowable buffers were discovered in the version of tcpdump included in many OS'. Some simply allow the remote attacker to crash the local tcpdump process. This is a problem for systems using tcpdump as a form of intrusion detection, as after an attacker has crashed the tcpdump process, network activity will no longer occur and may be able to cause arbitrary code to be executed as the user running tcpdump, often
There is a more serious vulnerability in the decoding of AFS ACL packets in tcpdump which may allow a remote attacker to execute arbitrary code on the local system (usually at root privilege, since root privilege is required to run tcpdump). Similar problem is in displaying NFS traffic, when tcpdump reliably segfaults.
Last problem is in using kernel filter: This issue occurs due to the
interaction in libpcap and the kernel implementation of
filters. When a
PF_PACKETsocket is created, it is bound into
the network and starts receiving packets. Packets are placed upon its
queue for pickup via
recvfrom(). libpcap then binds
the socket to an interface, and then sets the filter on the socket. None
of these actions call
skb_queue_purge(), which means that
packets that were put in the queue before the filter was set remain in
the queue and are picked up by libpcap, and hence
rpm -Uvh tcpdump.rpm
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.