Debian Security Advisory DSA 425-1 (tcpdump)

Summary
The remote host is missing an update to tcpdump announced via advisory DSA 425-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20425-1
Insight
Multiple vulnerabilities were discovered in tcpdump, a tool for inspecting network traffic. If a vulnerable version of tcpdump attempted to examine a maliciously constructed packet, a number of buffer overflows could be exploited to crash tcpdump, or potentially execute arbitrary code with the privileges of the tcpdump process. CVE-2003-1029 - infinite loop and memory consumption in processing L2TP packets CVE-2003-0989, CVE-2004-0057 - infinite loops in processing ISAKMP packets. CVE-2004-0055 - segmentation fault caused by a RADIUS attribute with a large length value For the current stable distribution (woody) these problems have been fixed in version 3.6.2-2.7. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you update your tcpdump package.