duh? hey raju..for the uninitiated...i know we shud get this in the first instance..but please can u elaborate a little what it means... esp this part "The BGP decoding routines for tcpdump used incorrect bounds checking when copying data." thanks sandy
Raju Mathur wrote: > [Fresh from the oven! Today's tcpdump vulnerability! -- Raju] > > This is an RFC 1153 digest. > (1 message) > ---------------------------------------------------------------------- > > Message-ID: <[EMAIL PROTECTED]> > From: [EMAIL PROTECTED] > Sender: [EMAIL PROTECTED] > To: [EMAIL PROTECTED] > Subject: [Full-Disclosure] [SECURITY] [DSA-206-1] tcpdump BGP decoding error > Date: Tue, 10 Dec 2002 23:41:24 +0100 > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------ > Debian Security Advisory DSA-206-1 [EMAIL PROTECTED] > http://www.debian.org/security/ Wichert Akkerman > December 10, 2002 > - ------------------------------------------------------------------------ > > Package : tcpdump > Problem type : incorrect bounds checking > Debian-specific: no > > The BGP decoding routines for tcpdump used incorrect bounds checking > when copying data. This could be abused by introducing malicious traffic > on a sniffed network for a denial of service attack against tcpdump, > or possibly even remote code execution. > > This has been fixed in version 3.6.2-2.2. > > - ------------------------------------------------------------------------ > > Obtaining updates: > > By hand: > wget URL > will fetch the file for you. > dpkg -i FILENAME.deb > will install the fetched file. > > With apt: > deb http://security.debian.org/ stable/updates main > added to /etc/apt/sources.list will provide security updates > > Additional information can be found on the Debian security webpages > at http://www.debian.org/security/ > > - ------------------------------------------------------------------------ > > Debian GNU/Linux 3.0 alias woody > - -------------------------------- > > Woody was released for alpha, arm, hppa, i386, ia64, m68k, mips, mipsel, > powerpc, s390 and sparc. > > Source archives: > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2.dsc > Size/MD5 checksum: 1284 be78c7328fcd439fe7eedf6a54894b28 > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz > Size/MD5 checksum: 380635 6bc8da35f9eed4e675bfdf04ce312248 > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2.diff.gz > Size/MD5 checksum: 8956 a07ace8578ec5555c87cbfd1faba8ecd > > alpha architecture (DEC Alpha) > > >http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_alpha.deb > Size/MD5 checksum: 213458 72603d37a351d08dfa7af4ab13e6301f > > arm architecture (ARM) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_arm.deb > Size/MD5 checksum: 179464 adb31a1747c0df1f1113454afb3a85f8 > > hppa architecture (HP PA RISC) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_hppa.deb > Size/MD5 checksum: 192892 28680f059cab0987ee313b672aa2edca > > i386 architecture (Intel ia32) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_i386.deb > Size/MD5 checksum: 169360 f303ec8777785c742a29469e49a9c63a > > ia64 architecture (Intel ia64) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_ia64.deb > Size/MD5 checksum: 246776 889eb67d84ef3500239a1ad7a721dd9e > > m68k architecture (Motorola Mc680x0) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_m68k.deb > Size/MD5 checksum: 157340 69ceb0d17d5e9ffca079b0bd7a18d489 > > mips architecture (MIPS (Big Endian)) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_mips.deb > Size/MD5 checksum: 188714 dbbe0d4eec80daa0f74b83c877064b87 > > powerpc architecture (PowerPC) > > >http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_powerpc.deb > Size/MD5 checksum: 176706 5121aa3b8891d1030d1924f1328efcdf > > s390 architecture (IBM S/390) > > http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_s390.deb > Size/MD5 checksum: 172534 1b2b2834af69c169893b5dee4b21eec3 > > sparc architecture (Sun SPARC/UltraSPARC) > > >http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.2_sparc.deb > Size/MD5 checksum: 179076 31a8382615ac8707b9346bfa9b1d615a > > - -- > - ---------------------------------------------------------------------------- > Debian Security team <[EMAIL PROTECTED]> > http://www.debian.org/security/ > Mailing-List: [EMAIL PROTECTED] > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.2.1 (GNU/Linux) > > iD8DBQE99m2RPLiSUC+jvC0RAgQwAJ9g72gzFPfdTVvTfhyX/5wb3H1fiQCfSZhu > /YTIMzeIfa1gS4sshBSjcME= > =FK7j > -----END PGP SIGNATURE----- > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > > ------------------------------ > > End of this Digest > ****************** > > -- > Raju Mathur [EMAIL PROTECTED] http://kandalaya.org/ > It is the mind that moves > > ================================================ > To unsubscribe, send email to [EMAIL PROTECTED] with unsubscribe in subject >header. Check archives at http://www.mail-archive.com/ilugd%40wpaa.org
