Skip to navigation

Security Advisory tcpdump security update

Advisory: RHSA-2005:505-03
Type: Security Advisory
Severity: Low
Issued on: 2005-06-13
Last updated on: 2005-06-13
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)
CVEs (cve.mitre.org): CVE-2005-1267

Details

Updated tcpdump packages that fix a security issue are now available.

This update has been rated as having low security impact by the Red
Hat Security Response Team.

Tcpdump is a command line tool for monitoring network traffic.

A denial of service bug was found in tcpdump during the processing of
certain network packets. It is possible for an attacker to inject a
carefully crafted packet onto the network, crashing a running tcpdump
session. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2005-1267 to this issue.

Users of tcpdump are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
tcpdump-3.8.2-10.RHEL4.src.rpm
File outdated by:  RHBA-2008:0062
    MD5: 282487d62fa99a54900b540261c399f8
 
IA-32:
arpwatch-2.1a13-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 915ffa5eb69ac30ef880db7a7d118eb1
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
tcpdump-3.8.2-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 54c561a0af5fa0f8d30693a58af3478f
 
x86_64:
arpwatch-2.1a13-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: b28de5bc7cd4a6b6accd48c0bf6edb59
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: dacdf9f4f40a12cf36d89a0ed3249187
tcpdump-3.8.2-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: ef7dc19abecc70943533bde89c3e7f59
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
tcpdump-3.8.2-10.RHEL4.src.rpm
File outdated by:  RHBA-2008:0062
    MD5: 282487d62fa99a54900b540261c399f8
 
IA-32:
arpwatch-2.1a13-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 915ffa5eb69ac30ef880db7a7d118eb1
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
tcpdump-3.8.2-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 54c561a0af5fa0f8d30693a58af3478f
 
IA-64:
arpwatch-2.1a13-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: 0249f1f82c2b0d2991e08256ba45efb9
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: effeaf9e1937b5fbc16e291fc7c47a79
tcpdump-3.8.2-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: cbd5cd10732b1e8a66854f35f09342a6
 
PPC:
arpwatch-2.1a13-10.RHEL4.ppc.rpm
File outdated by:  RHBA-2008:0062
    MD5: a11bc11bfac3d410a351ca3b47485025
libpcap-0.8.3-10.RHEL4.ppc.rpm
File outdated by:  RHBA-2008:0062
    MD5: 3a3cbe9a5f59a067b94acfec2524a180
libpcap-0.8.3-10.RHEL4.ppc64.rpm
File outdated by:  RHBA-2008:0062
    MD5: e6ba2d5dd9271a85001918c91d2afe57
tcpdump-3.8.2-10.RHEL4.ppc.rpm
File outdated by:  RHBA-2008:0062
    MD5: 47a75b07dfed82a17420cf3b23814d43
 
s390:
arpwatch-2.1a13-10.RHEL4.s390.rpm
File outdated by:  RHBA-2008:0062
    MD5: 095b4699cc2b62e1dac9f4d00e97b47f
libpcap-0.8.3-10.RHEL4.s390.rpm
File outdated by:  RHBA-2008:0062
    MD5: 1f810b00fc409bcf612e062d7c274c22
tcpdump-3.8.2-10.RHEL4.s390.rpm
File outdated by:  RHBA-2008:0062
    MD5: fbbad5da43b5df92bf533ffef59e1249
 
s390x:
arpwatch-2.1a13-10.RHEL4.s390x.rpm
File outdated by:  RHBA-2008:0062
    MD5: 2f9a9af8bbc8430415d12aaf266b1e10
libpcap-0.8.3-10.RHEL4.s390.rpm
File outdated by:  RHBA-2008:0062
    MD5: 1f810b00fc409bcf612e062d7c274c22
libpcap-0.8.3-10.RHEL4.s390x.rpm
File outdated by:  RHBA-2008:0062
    MD5: d2b5e5a8764736d74c8ef214b95c59f1
tcpdump-3.8.2-10.RHEL4.s390x.rpm
File outdated by:  RHBA-2008:0062
    MD5: 1655c64e87224852fc8093860ceb474b
 
x86_64:
arpwatch-2.1a13-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: b28de5bc7cd4a6b6accd48c0bf6edb59
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: dacdf9f4f40a12cf36d89a0ed3249187
tcpdump-3.8.2-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: ef7dc19abecc70943533bde89c3e7f59
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
tcpdump-3.8.2-10.RHEL4.src.rpm
File outdated by:  RHBA-2008:0062
    MD5: 282487d62fa99a54900b540261c399f8
 
IA-32:
arpwatch-2.1a13-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 915ffa5eb69ac30ef880db7a7d118eb1
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
tcpdump-3.8.2-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 54c561a0af5fa0f8d30693a58af3478f
 
IA-64:
arpwatch-2.1a13-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: 0249f1f82c2b0d2991e08256ba45efb9
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: effeaf9e1937b5fbc16e291fc7c47a79
tcpdump-3.8.2-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: cbd5cd10732b1e8a66854f35f09342a6
 
x86_64:
arpwatch-2.1a13-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: b28de5bc7cd4a6b6accd48c0bf6edb59
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: dacdf9f4f40a12cf36d89a0ed3249187
tcpdump-3.8.2-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: ef7dc19abecc70943533bde89c3e7f59
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
tcpdump-3.8.2-10.RHEL4.src.rpm
File outdated by:  RHBA-2008:0062
    MD5: 282487d62fa99a54900b540261c399f8
 
IA-32:
arpwatch-2.1a13-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 915ffa5eb69ac30ef880db7a7d118eb1
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
tcpdump-3.8.2-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 54c561a0af5fa0f8d30693a58af3478f
 
IA-64:
arpwatch-2.1a13-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: 0249f1f82c2b0d2991e08256ba45efb9
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: effeaf9e1937b5fbc16e291fc7c47a79
tcpdump-3.8.2-10.RHEL4.ia64.rpm
File outdated by:  RHBA-2008:0062
    MD5: cbd5cd10732b1e8a66854f35f09342a6
 
x86_64:
arpwatch-2.1a13-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: b28de5bc7cd4a6b6accd48c0bf6edb59
libpcap-0.8.3-10.RHEL4.i386.rpm
File outdated by:  RHBA-2008:0062
    MD5: 243f6883db13135f88f6692ad3280e34
libpcap-0.8.3-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: dacdf9f4f40a12cf36d89a0ed3249187
tcpdump-3.8.2-10.RHEL4.x86_64.rpm
File outdated by:  RHBA-2008:0062
    MD5: ef7dc19abecc70943533bde89c3e7f59
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

159208 - CAN-2005-1267 tcpdump BGP DoS


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/