Summary
The remote host is missing an update to tcpdump
announced via advisory DSA 1353-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201353-1
Insight
It was discovered that an integer overflow in the BGP dissector of tcpdump, a powerful tool for network monitoring and data acquisition, may lead to the execution of arbitrary code.
For the oldstable distribution (sarge) this problem has been fixed in version 3.8.3-5sarge3.
For the stable distribution (etch) this problem has been fixed in version 3.9.5-2etch1.
For the unstable distribution (sid) this problem has been fixed in version 3.9.5-3.
We recommend that you upgrade your tcpdump package.
Severity
Classification
-
CVE CVE-2007-3798 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities