Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-RU-2015:0335-1

Опубликовано: 20 мар. 2015
Источник: suse-cvrf

Описание

Security update for tcpdump

When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network.

The following vulnerabilities in protocol printers have been fixed:

* IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220) * Ethernet printer remote DoS (CVE-2015-2154, bnc#922222) * PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Security Issues:

* CVE-2015-0261 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261> * CVE-2015-2154 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154> * CVE-2014-9140 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140>

Список пакетов

SUSE Linux Enterprise Desktop 11 SP3
tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3
tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA
tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3
tcpdump-3.9.8-1.27.1

Описание

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3:tcpdump-3.9.8-1.27.1

Ссылки

Описание

tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3:tcpdump-3.9.8-1.27.1

Ссылки

Описание

Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3:tcpdump-3.9.8-1.27.1

Ссылки

Описание

Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3:tcpdump-3.9.8-1.27.1

Ссылки

Описание

The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.


Затронутые продукты
SUSE Linux Enterprise Desktop 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3-TERADATA:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server 11 SP3:tcpdump-3.9.8-1.27.1
SUSE Linux Enterprise Server for SAP Applications 11 SP3:tcpdump-3.9.8-1.27.1

Ссылки
Уязвимость SUSE-RU-2015:0335-1