blob: 9fa4462da5d20b7784632a1d73bbcae957f659a0 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200505-06">
<title>TCPDump: Decoding routines Denial of Service vulnerability</title>
A flaw in the decoding of network packets renders TCPDump vulnerable to a
remote Denial of Service attack.
<product type="ebuild">tcpdump</product>
<announced>May 09, 2005</announced>
<revised>June 12, 2005: 02</revised>
<package name="net-analyzer/tcpdump" auto="yes" arch="*">
<unaffected range="ge">3.8.3-r3</unaffected>
<vulnerable range="lt">3.8.3-r3</vulnerable>
TCPDump is a tool for network monitoring and data acquisition.
TCPDump improperly handles and decodes ISIS (CAN-2005-1278), BGP
(CAN-2005-1267, CAN-2005-1279), LDP (CAN-2005-1279) and RSVP
(CAN-2005-1280) packets. TCPDump might loop endlessly after receiving
malformed packets.
<impact type="normal">
A malicious remote attacker can exploit the decoding issues for a
Denial of Service attack by sending specially crafted packets, possibly
causing TCPDump to loop endlessly.
There is no known workaround at this time.
All TCPDump users should upgrade to the latest available version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-analyzer/tcpdump-3.8.3-r3&quot;</code>
<uri link="">CAN-2005-1267</uri>
<uri link="">CAN-2005-1278</uri>
<uri link="">CAN-2005-1279</uri>
<uri link="">CAN-2005-1280</uri>
<metadata tag="requester" timestamp="Sun, 08 May 2005 15:18:02 +0000">
<metadata tag="submitter" timestamp="Sun, 08 May 2005 15:56:20 +0000">
<metadata tag="bugReady" timestamp="Mon, 09 May 2005 19:22:22 +0000">