---------------------------------------------------------------------------- Arch Linux Security Warning ALSW 2007-#33 -----------------------------------------------------------------------------
Name: tcpdump Date: 2007-07-25 Severity: Medium Warning #: 2007-#33 ----------------------------------------------------------------------------- ------------------------------------------------------------------------ Product Background ============================= A tool for network monitoring and data acquisition Problem Background ============================= The return value of a call to snprintf is not sanitized before being used in an addition to calculate the number of bytes remaining the buffer within a loop. The result is a remotely exploitable buffer overflow since the length calculation will eventually underflow and thus make the length parameter of subsequent snprintf calls irrelevant. Impact ============================= A remote attacker could execute arbitrary code. Problem Packages ============================= Package: tcpdump Repo: current Group: network Unsafe: < 3.9.7 Safe: >= 3.9.7 Package Fix ============================= Upgrade to 3.9.7 --------------------------------------------------------------------------- Unofficial ArchLinux Security Bug Tracker: http://jjdanimoth.netsons.org/alsw.html ---------------------------------------------------------------------------- Reference(s) ============================= http://bugs.gentoo.org/show_bug.cgi?id=184815 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798
signature.asc
Description: OpenPGP digital signature
_______________________________________________ arch mailing list [email protected] http://archlinux.org/mailman/listinfo/arch
