Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA854] DSA-854-1 tcpdump


Vulnerability Assessment Details

[DSA854] DSA-854-1 tcpdump

Vulnerability Assessment Summary
DSA-854-1 tcpdump

Detailed Explanation for this Vulnerability Assessment

Simon Nielsen discovered that the BGP dissector in tcpdump, a powerful
tool for network monitoring and data acquisition, does not properly
handle a -1 return value from an internal function that decodes data
packets. A specially crafted BGP packet can cause a denial of service
via an infinite loop.
The old stable distribution (woody) is not affected by this problem.
For the stable distribution (sarge) this problem has been fixed in
version 3.8.3-5sarge1.
We recommend that you upgrade your tcpdump package.


Solution : http://www.debian.org/security/2005/dsa-854
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

IBM Lenovo TD340 Tower Server Intel® Xeon® E5-2403 2x900GB 10k SAS 32gb DDR3
$744.95
IBM Lenovo TD340 Tower Server Intel® Xeon® E5-2403 2x900GB 10k SAS 32gb DDR3 pictureIBM 24R2640 / 39Y7169 Server power supply xSeries 336 585 W
$7.63
IBM 24R2640 / 39Y7169 Server power supply xSeries 336 585 W pictureIBM 49Y1528 47J0158 46C0599 DDR3 16GB 10600 1333Mhz 1.35v Server Ram
$119.0
IBM 49Y1528 47J0158 46C0599 DDR3 16GB 10600 1333Mhz 1.35v Server Ram pictureIBM x3550 M4 2 *E5-2650 2.0ghz 8-Core CPU 192GB(24x8GB) RAM, 1 *750w AC
$699.0
IBM x3550 M4 2 *E5-2650 2.0ghz 8-Core CPU 192GB(24x8GB) RAM, 1 *750w AC picture


Discussions

No Discussions have been posted on this vulnerability.