Rapid7 Vulnerability & Exploit Database

RHSA-2002:094: Updated tcpdump packages fix buffer overflow

Back to Search

RHSA-2002:094: Updated tcpdump packages fix buffer overflow

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/18/2002
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated tcpdump, libpcap, and arpwatch packages are available for Red Hat Linux 6.2 and 7.x. These updates close a buffer overflow when handling NFS packets. [Update 3 October 2002] Replacement packages have been added for Red Hat Linux 6.2 as the previous packages could not be installed with the version of RPM that shipped with Red Hat Linux 6.2. Replacement packages have also been added for Red Hat Linux 7.0 as the previous packages were not built correctly.

tcpdump is a command-line tool for monitoring network traffic. Versions of tcpdump up to and including 3.6.2 have a buffer overflow that can be triggered when tracing the network by a bad NFS packet. We are not yet aware if this issue is fully exploitable; however, users of tcpdump are advised to upgrade to these errata packages which contain a patch for this issue. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0380 to this issue. This issue was found by David Woodhouse of Red Hat.

Solution(s)

  • redhat-upgrade-arpwatch
  • redhat-upgrade-libpcap
  • redhat-upgrade-tcpdump

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;