Jump to content

Security Advisory: tcpdump


aru
 Share

Recommended Posts

MandrakeSoft Security Advisory MDKSA-2003:027 : tcpdump

 

March 3rd, 2003

Updated tcpdump packages fix denial of service vulnerabilities

 

A vulnerability was discovered by Andrew Griffiths and iDEFENSE Labs in the tcpdump program. By sending a specially crafted network packet, an attacker is able to to cause tcpdump to enter an infinite loop. In addition, the tcpdump developers found a potential infinite loop when tcpdump parses malformed BGP packets. A buffer overflow was also discovered that can be exploited with certain malformed NFS packets.

 

 

The released versions of Mandrake GNU/Linux affected are:

  • 8.1

8.1/IA64

8.2

8.2/PPC

9.0

Single Network Firewall 7.2

Multi Network Firewall 8.2

Corporate Server 2.1 [/b]

 

 

All the information about this advisory at:

www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:027

 

This stuff was posted automatically by aru

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
 Share

×
×
  • Create New...