CERTA-2003-AVI-044
Vulnerability from certfr_avis
Diverses failles concernant l'interprétation de certains protocoles par tcpdump ont été identifiées.
Description
Des paquets correspondants aux protocoles BGP (« Border Gateway Protocol »), ISAKMP (« Internet Security Association and Key Management Protocol ») ou RADIUS (authentification), spécifiquement falsifiés, peuvent bloquer tcpdump et empêcher son utilisateur de voir le trafic réseau.
Par ailleurs, un débordement de mémoire dans la gestion du protocole NFS (« Network File System ») serait exploitable pour s'emparer de l'hôte éxécutant tcpdump.
Solution
Mettre à jour en suivant les recommandations de l'éditeur :
-
Mandrake
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027 -
Debian
http://www.debian.org/security/2003/dsa-261 -
SuSE
http://www.suse.com/de/security/2003_015_tcpdump.html -
RedHat
http://rhn.redhat.com/errata/RHSA-2003-085.html -
Gentoo
http://forums.gentoo.org/viewtopic.php?t=39378 -
Trustix
http://www.trustix.net/errata/misc/2003/TSL-2003-0012-tcpdump.asc.txt -
OpenPKG
http://www.openpkg.org/security/OpenPKG-SA-2003.014-tcpdump.html -
Turbolinux
http://www.turbolinux.com/security/TLSA-2003-14.txt
Distributions Linux suivantes :
- Mandrake ;
- Debian ;
- SuSE ;
- Red Hat ;
- Gentoo ;
- Trustix ;
- OpenPKG ;
- Turbolinux.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eDistributions Linux suivantes :\u003c/P\u003e \u003cUL\u003e \u003cLI\u003eMandrake ;\u003c/LI\u003e \u003cLI\u003eDebian ;\u003c/LI\u003e \u003cLI\u003eSuSE ;\u003c/LI\u003e \u003cLI\u003eRed Hat ;\u003c/LI\u003e \u003cLI\u003eGentoo ;\u003c/LI\u003e \u003cLI\u003eTrustix ;\u003c/LI\u003e \u003cLI\u003eOpenPKG ;\u003c/LI\u003e \u003cLI\u003eTurbolinux.\u003c/LI\u003e \u003c/UL\u003e",
"content": "## Description\n\nDes paquets correspondants aux protocoles BGP (\u00ab Border Gateway Protocol\n\u00bb), ISAKMP (\u00ab Internet Security Association and Key Management Protocol\n\u00bb) ou RADIUS (authentification), sp\u00e9cifiquement falsifi\u00e9s, peuvent\nbloquer tcpdump et emp\u00eacher son utilisateur de voir le trafic r\u00e9seau.\n\nPar ailleurs, un d\u00e9bordement de m\u00e9moire dans la gestion du protocole NFS\n(\u00ab Network File System \u00bb) serait exploitable pour s\u0027emparer de l\u0027h\u00f4te\n\u00e9x\u00e9cutant tcpdump.\n\n## Solution\n\nMettre \u00e0 jour en suivant les recommandations de l\u0027\u00e9diteur :\n\n- Mandrake\n\n http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027\n\n- Debian\n\n http://www.debian.org/security/2003/dsa-261\n\n- SuSE\n\n http://www.suse.com/de/security/2003_015_tcpdump.html\n\n- RedHat\n\n http://rhn.redhat.com/errata/RHSA-2003-085.html\n\n- Gentoo\n\n http://forums.gentoo.org/viewtopic.php?t=39378\n\n- Trustix\n\n http://www.trustix.net/errata/misc/2003/TSL-2003-0012-tcpdump.asc.txt\n\n- OpenPKG\n\n http://www.openpkg.org/security/OpenPKG-SA-2003.014-tcpdump.html\n\n- Turbolinux\n\n http://www.turbolinux.com/security/TLSA-2003-14.txt\n",
"cves": [],
"initial_release_date": "2003-03-13T00:00:00",
"last_revision_date": "2003-03-25T00:00:00",
"links": [],
"reference": "CERTA-2003-AVI-044",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-03-13T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 SuSE.",
"revision_date": "2003-03-14T00:00:00.000000"
},
{
"description": "Ajout des r\u00e9f\u00e9rences CVE et des distributions Red Hat, Trustix, OpenPKG et Turbolinux.",
"revision_date": "2003-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Risque de compromission avec les droits de l\u0027utilisateur (g\u00e9n\u00e9ralement root )"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": "Diverses failles concernant l\u0027interpr\u00e9tation de certains protocoles par\n\u003cspan class=\"textit\"\u003etcpdump\u003c/span\u003e ont \u00e9t\u00e9 identifi\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans tcpdump",
"vendor_advisories": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…