[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070731032016.GI9881@outflux.net>
Date: Mon, 30 Jul 2007 20:20:16 -0700
From: Kees Cook <kees@...ntu.com>
To: ubuntu-security-announce@...ts.ubuntu.com
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: [USN-492-1] tcpdump vulnerability
===========================================================
Ubuntu Security Notice USN-492-1 July 30, 2007
tcpdump vulnerability
CVE-2007-3798
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04
This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the
following package versions:
Ubuntu 6.06 LTS:
tcpdump 3.9.4-2ubuntu0.2
Ubuntu 6.10:
tcpdump 3.9.4-4ubuntu0.2
Ubuntu 7.04:
tcpdump 3.9.5-2ubuntu1
In general, a standard system upgrade is sufficient to effect the
necessary changes.
Details follow:
A flaw was discovered in the BGP dissector of tcpdump. Remote
attackers could send specially crafted packets and execute arbitrary
code with user privileges.
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2.diff.gz
Size/MD5: 11829 2c911638159adc11d2ff54f96182de54
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2.dsc
Size/MD5: 685 a8ab006366dbe0973e06d08bec9ed359
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4.orig.tar.gz
Size/MD5: 716862 4b64755bbc8ba1af49c747271a6df5b8
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2_amd64.deb
Size/MD5: 313048 eeb295aada8253ed88675759a5b9fefc
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2_i386.deb
Size/MD5: 289664 ae14411448b3cc4f6aeb99137ab08242
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2_powerpc.deb
Size/MD5: 301184 227cfb459beba4f873524ff0351994d7
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.2_sparc.deb
Size/MD5: 305034 56c94f1b847c19301e59c0ca09b05373
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2.diff.gz
Size/MD5: 11966 781a774a620649e0c6a6e208fb98644c
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2.dsc
Size/MD5: 632 7f81be7f487baa766845a1701d95d797
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4.orig.tar.gz
Size/MD5: 716862 4b64755bbc8ba1af49c747271a6df5b8
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2_amd64.deb
Size/MD5: 315162 7b2246a74280ede3bb105aa580cd0866
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2_i386.deb
Size/MD5: 300680 4125eb94e7ec30f41d03740f0154f504
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2_powerpc.deb
Size/MD5: 303704 0f1c7c7cc722c6039f8078ea620a75ad
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.2_sparc.deb
Size/MD5: 308620 7c11b491590794464980b7e4bb801925
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1.diff.gz
Size/MD5: 11970 c875dadc73193df8f1bba9ebac4a9bcc
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1.dsc
Size/MD5: 712 037ba4c3cf2113ac1ee02f3008cc4917
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5.orig.tar.gz
Size/MD5: 712411 2135e7b1f09af0eaf66d2af822bed44a
amd64 architecture (Athlon64, Opteron, EM64T Xeon)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1_amd64.deb
Size/MD5: 317680 164f2980e2673cc641661a859c260d98
i386 architecture (x86 compatible Intel/AMD)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1_i386.deb
Size/MD5: 303426 1f5aaddf44cd3057241f6e2364183ecd
powerpc architecture (Apple Macintosh G3/G4/G5)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1_powerpc.deb
Size/MD5: 308756 06ca55a167c3b0caac6add7a8d0b2981
sparc architecture (Sun SPARC/UltraSPARC)
http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.5-2ubuntu1_sparc.deb
Size/MD5: 312192 dce58020c8b5a99316e3d1d1fba2923b
Download attachment "signature.asc" of type "application/pgp-signature" (190 bytes)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists