SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Tcpdump Vendors:   Tcpdump.org
(Red Hat Issues Fix for RH Enterprise Linux) Tcpdump Boundary Checking Error in 'print-isakmp.c' Lets Remote Users Crash Tcpdump
SecurityTracker Alert ID:  1010293
SecurityTracker URL:  http://securitytracker.com/id/1010293
CVE Reference:   CVE-2004-0183, CVE-2004-0184   (Links to External Site)
Date:  May 26 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.8.2
Description:   Two vulnerabilities were reported in tcpdump. A remote user can cause tcpdump to crash when in a certain configuration.

The tcpdump vendor reported that 'print-isakmp.c' does not properly validate user-supplied input in ISAKMP packets. A remote user can send a specially crafted packet to trigger the flaw.

Rapid7 subsequently issued an advisory [see the Message History] that provided additional details. The advisory indicated that the vulnerability applies only in the verbose packet display (-v) mode.

A remote user can send a specially crafted ISAKMP Delete payload with a large number of Security Protocol Identifiers (SPIs) to cause the tcpdump application to crash [CVE: CVE-2004-0183] due to a buffer overflow.

It is also reported that a remote user can send an ISAKMP Identification payload with a specially crafted payload length value that is less than 8 to cause tcpdump to crash [CVE: CVE-2004-0184].

The Rapid7 advisory provides additional details and is available at:

http://www.rapid7.com/advisories/R7-0017.html

Impact:   A remote user can cause tcpdump to crash.
Solution:   Red Hat has released a fix.

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

ppc:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc.rpm

ppc64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc64.rpm

s390:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390.rpm

s390x:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390x.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390x.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

The verification checksums are:

MD5 sum Package Name
39785de17ac747a95d75c3856ce10a8f arpwatch-2.1a11-12.2.1AS.6.i386.rpm
6251264976756412d80f74041e5c277a arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
2d79602baa89bd6070541e7ac0fb3ea8 libpcap-0.6.2-12.2.1AS.6.i386.rpm
d86bb232ba584afe8a55f02d7e789d93 libpcap-0.6.2-12.2.1AS.6.ia64.rpm
d463f8099c444830358bf8f6b8f57be3 libpcap-0.7.2-7.E3.2.i386.rpm
4c6ddd5421cc23a43735e014e54be67e libpcap-0.7.2-7.E3.2.ia64.rpm
cfb803a434669955505e83d759865c1b libpcap-0.7.2-7.E3.2.ppc.rpm
4c931b56f4eedea44f2e01603842bcff libpcap-0.7.2-7.E3.2.ppc64.rpm
5b0085309d79b6dc81373b1a8d028699 libpcap-0.7.2-7.E3.2.s390.rpm
690139912f28e6c5db35115389bab7fe libpcap-0.7.2-7.E3.2.s390x.rpm
a47644862b993c272d73d5982b6a0f72 libpcap-0.7.2-7.E3.2.x86_64.rpm
8c592a8b97f599bf12c7bc0335422107 tcpdump-3.6.2-12.2.1AS.6.i386.rpm
2bbc2c761f382bba8d8693b131239541 tcpdump-3.6.2-12.2.1AS.6.ia64.rpm
06099571cae2217649509843c705a153 tcpdump-3.6.2-12.2.1AS.6.src.rpm
1b6524ff06794b8aed95acfea00ebfa7 tcpdump-3.7.2-7.E3.2.i386.rpm
34fbc4a48e7f7f3471aa9ed82706e20f tcpdump-3.7.2-7.E3.2.ia64.rpm
011624c4af4fc835ff0d5c06c729eaa2 tcpdump-3.7.2-7.E3.2.ppc.rpm
0217bb2ee74895ffb00be005126935e3 tcpdump-3.7.2-7.E3.2.ppc64.rpm
cca41d020017136662ac065eb9720987 tcpdump-3.7.2-7.E3.2.s390.rpm
0615c37cea73f9f060fa45ae6a32f93e tcpdump-3.7.2-7.E3.2.s390x.rpm
8245acfffe0d89c4381885f71e0ece3f tcpdump-3.7.2-7.E3.2.src.rpm
b6694e17a21f612abf6e7d8e94dd50fe tcpdump-3.7.2-7.E3.2.x86_64.rpm

Vendor URL:  tcpdump.org/tcpdump-changes.txt (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  2.1, 3

Message History:   This archive entry is a follow-up to the message listed below.
Mar 30 2004 Tcpdump Boundary Checking Error in 'print-isakmp.c' Lets Remote Users Crash Tcpdump



 Source Message Contents

Subject:  [RHSA-2004:219-01] Updated tcpdump packages fix various


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated tcpdump packages fix various vulnerabilities
Advisory ID:       RHSA-2004:219-01
Issue date:        2004-05-26
Updated on:        2004-05-26
Product:           Red Hat Enterprise Linux
Keywords:          tcpdump buffer overflow libpcap arpwatch
Cross references:  
Obsoletes:         RHSA-2004:008-09
CVE Names:         CAN-2004-0183 CAN-2004-0184
- ---------------------------------------------------------------------

1. Topic:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in
ISAKMP parsing.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Tcpdump is a command-line tool for monitoring network traffic. 

Tcpdump v3.8.1 and earlier versions contained multiple flaws in the
packet display functions for the ISAKMP protocol.  Upon receiving
specially crafted ISAKMP packets, TCPDUMP would try to read beyond
the end of the packet capture buffer and subsequently crash.

Users of tcpdump are advised to upgrade to these erratum packages, which
contain backported security patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Please note that this update is available via Red Hat Network.  To use Red
Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

123030 - CAN-2004-0183/0184 tcpdump ISAKMP crash
120022 - CAN-2004-0183/0184 tcpdump ISAKMP crash

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

ppc:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc.rpm

ppc64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc64.rpm

s390:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390.rpm

s390x:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390x.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390x.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------
39785de17ac747a95d75c3856ce10a8f arpwatch-2.1a11-12.2.1AS.6.i386.rpm
6251264976756412d80f74041e5c277a arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
2d79602baa89bd6070541e7ac0fb3ea8 libpcap-0.6.2-12.2.1AS.6.i386.rpm
d86bb232ba584afe8a55f02d7e789d93 libpcap-0.6.2-12.2.1AS.6.ia64.rpm
d463f8099c444830358bf8f6b8f57be3 libpcap-0.7.2-7.E3.2.i386.rpm
4c6ddd5421cc23a43735e014e54be67e libpcap-0.7.2-7.E3.2.ia64.rpm
cfb803a434669955505e83d759865c1b libpcap-0.7.2-7.E3.2.ppc.rpm
4c931b56f4eedea44f2e01603842bcff libpcap-0.7.2-7.E3.2.ppc64.rpm
5b0085309d79b6dc81373b1a8d028699 libpcap-0.7.2-7.E3.2.s390.rpm
690139912f28e6c5db35115389bab7fe libpcap-0.7.2-7.E3.2.s390x.rpm
a47644862b993c272d73d5982b6a0f72 libpcap-0.7.2-7.E3.2.x86_64.rpm
8c592a8b97f599bf12c7bc0335422107 tcpdump-3.6.2-12.2.1AS.6.i386.rpm
2bbc2c761f382bba8d8693b131239541 tcpdump-3.6.2-12.2.1AS.6.ia64.rpm
06099571cae2217649509843c705a153 tcpdump-3.6.2-12.2.1AS.6.src.rpm
1b6524ff06794b8aed95acfea00ebfa7 tcpdump-3.7.2-7.E3.2.i386.rpm
34fbc4a48e7f7f3471aa9ed82706e20f tcpdump-3.7.2-7.E3.2.ia64.rpm
011624c4af4fc835ff0d5c06c729eaa2 tcpdump-3.7.2-7.E3.2.ppc.rpm
0217bb2ee74895ffb00be005126935e3 tcpdump-3.7.2-7.E3.2.ppc64.rpm
cca41d020017136662ac065eb9720987 tcpdump-3.7.2-7.E3.2.s390.rpm
0615c37cea73f9f060fa45ae6a32f93e tcpdump-3.7.2-7.E3.2.s390x.rpm
8245acfffe0d89c4381885f71e0ece3f tcpdump-3.7.2-7.E3.2.src.rpm
b6694e17a21f612abf6e7d8e94dd50fe tcpdump-3.7.2-7.E3.2.x86_64.rpm


These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>


8. References:

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184
http://marc.theaimsgroup.com/?l=bugtraq&m=108067265931525&w=2
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAtEvxXlSAg2UNWIIRAhrZAKDDyL9C0OKSwrpKuHinOwh6Z64bCwCdGgIQ
XCvKkGdApEM+A0Kuv0LcznM=
=KNbv
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC