int(3039)

Vulnerability Bulletins


Denegación de servicio en Tcpdump

Vulnerability classification

Property Value
Confidence level Oficial
Impact Denegación de Servicio
Dificulty Experto
Required attacker level Acceso remoto sin cuenta a un servicio exotico

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Tcpdump <= 3.9.5

Description

Se ha descubierto una vulnerabilidad del tipo desbordamiento de búfer en tcpdump 3.9.5 y en versiones anteriores. La vulnerabilidad reside en un error del tipo "off-by-one" en la función "parse_elements()" en el código de print-802_11.c.

Un atacante remoto podría causar una denegación de servicio mediante una estructura de datos de 802.11.

Solution



Actualización de software

Mandriva

Corporate Server 3.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/i586/tcpdump-3.8.1-1.3.C30mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/tcpdump-3.8.1-1.3.C30mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/x86_64/tcpdump-3.8.1-1.3.C30mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/tcpdump-3.8.1-1.3.C30mdk.src.rpm

Mandriva Linux 2006
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/i586/tcpdump-3.9.3-1.3.20060mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/tcpdump-3.9.3-1.3.20060mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/x86_64/tcpdump-3.9.3-1.3.20060mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/tcpdump-3.9.3-1.3.20060mdk.src.rpm

Mandriva Linux 2007
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/i586/tcpdump-3.9.4-1.1mdv2007.0.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/tcpdump-3.9.4-1.1mdv2007.0.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/x86_64/tcpdump-3.9.4-1.1mdv2007.0.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.0/SRPMS/tcpdump-3.9.4-1.1mdv2007.0.src.rpm

Corporate Server 4.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/i586/tcpdump-3.9.3-1.3.20060mlcs4.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/tcpdump-3.9.3-1.3.20060mlcs4.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/x86_64/tcpdump-3.9.3-1.3.20060mlcs4.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/4.0/SRPMS/tcpdump-3.9.3-1.3.20060mlcs4.src.rpm

Debian

Debian Linux 3.1
Source
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2.dsc
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2.diff.gz
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_alpha.deb
AMD64
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_amd64.deb
ARM
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_arm.deb
HP Precision
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_hppa.deb
Intel IA-32
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_ia64.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.8.3-5sarge2_sparc.deb

Mandriva (MDKSA-2007:155)

Mandriva Linux 2007.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/i586/tcpdump-3.9.5-1.2mdv2007.1.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/tcpdump-3.9.5-1.2mdv2007.1.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/x86_64/tcpdump-3.9.5-1.2mdv2007.1.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2007.1/SRPMS/tcpdump-3.9.5-1.2mdv2007.1.src.rpm

Red Hat (RHSA-2007:0368-4)
RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
https://rhn.redhat.com/

Red Hat (RHSA-2007:0387-4)
Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
https://rhn.redhat.com/

Apple
Security Update 2007-009 / Mac OS X 10.4.11 (Universal)
http://www.apple.com/support/downloads/securityupdate200700910411universal.html
Security Update 2007-009 / Max OS X 10.4.11 (PPC)
http://www.apple.com/support/downloads/securityupdate200700910411ppc.html
Security Update 2007-009 / Max OS X 10.5.1
http://www.apple.com/support/downloads/securityupdate20070091051.html

Standar resources

Property Value
CVE CVE-2007-1218
BID

Other resources

Mandriva Security Advisory (MDKSA-2007:056)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:056

Debian Security Advisory (DSA 1272-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00027.html

Mandriva Security Advisory (MDKSA-2007:155)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:155

Red Hat Security Advisory (RHSA-2007:0368-4)
https://rhn.redhat.com/errata/RHSA-2007-0368.html

Red Hat Security Advisory (RHSA-2007:0387-4)
https://rhn.redhat.com/errata/RHSA-2007-0387.html

Apple Security Update (307179)
http://docs.info.apple.com/article.html?artnum=307179

Version history

Version Comments Date
1.0 Aviso emitido 2007-03-12
1.1 Aviso emitido por Debian (DSA 1272-1) 2007-03-23
1.2 Aviso emitido por Mandriva (MDKSA-2007:155) 2007-08-10
1.3 Aviso emitido por Red Hat (RHSA-2007:0368-4) 2007-11-09
1.4 Aviso emitido por Red Hat (RHSA-2007:0387-4) 2007-11-20
1.5 Aviso emitido por Apple (307179) 2007-12-31
Ministerio de Defensa
CNI
CCN
CCN-CERT