Summary
The remote host is missing an update to tcpdump
announced via advisory DSA 425-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20425-1
Insight
Multiple vulnerabilities were discovered in tcpdump, a tool for inspecting network traffic. If a vulnerable version of tcpdump attempted to examine a maliciously constructed packet, a number of buffer overflows could be exploited to crash tcpdump, or potentially execute arbitrary code with the privileges of the tcpdump process.
CVE-2003-1029 - infinite loop and memory consumption in processing L2TP packets
CVE-2003-0989, CVE-2004-0057 - infinite loops in processing ISAKMP packets.
CVE-2004-0055 - segmentation fault caused by a RADIUS attribute with a large length value
For the current stable distribution (woody) these problems have been fixed in version 3.6.2-2.7.
For the unstable distribution (sid) these problems will be fixed soon.
We recommend that you update your tcpdump package.
Severity
Classification
-
CVE CVE-2003-0989, CVE-2003-1029, CVE-2004-0055, CVE-2004-0057 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities