----------------------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#33
-----------------------------------------------------------------------------

Name: tcpdump
Date: 2007-07-25
Severity: Medium
Warning #: 2007-#33
-----------------------------------------------------------------------------

------------------------------------------------------------------------

Product Background
=============================

A tool for network monitoring and data acquisition

Problem Background
=============================

The return value of a call to snprintf is not sanitized before being
used in an addition to calculate the number of bytes remaining the
buffer within a loop. The result is a remotely exploitable buffer
overflow since the length calculation will eventually underflow and thus
make the length parameter of subsequent snprintf calls irrelevant.

Impact

=============================

A remote attacker could execute arbitrary code.

Problem Packages
=============================

Package: tcpdump
Repo: current
Group: network
Unsafe: < 3.9.7
Safe: >= 3.9.7

Package Fix
=============================

Upgrade to 3.9.7

---------------------------------------------------------------------------

Unofficial ArchLinux Security Bug Tracker:
http://jjdanimoth.netsons.org/alsw.html
----------------------------------------------------------------------------

Reference(s)
=============================

http://bugs.gentoo.org/show_bug.cgi?id=184815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
arch mailing list
[email protected]
http://archlinux.org/mailman/listinfo/arch

Reply via email to