Executive Summary
Summary | |
---|---|
Title | tcpdump security update |
Informations | |||
---|---|---|---|
Name | DSA-3193 | First vendor Publication | 2015-03-17 |
Vendor | Debian | Last vendor Modification | 2015-03-17 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service (application crash) or, potentially, execution of arbitrary code. For the stable distribution (wheezy), these problems have been fixed in version 4.3.0-1+deb7u2. For the upcoming stable distribution (jessie), these problems have been fixed in version 4.6.2-4. For the unstable distribution (sid), these problems have been fixed in version 4.6.2-4. We recommend that you upgrade your tcpdump packages. |
Original Source
Url : http://www.debian.org/security/2015/dsa-3193 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
75 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28335 | |||
Oval ID: | oval:org.mitre.oval:def:28335 | ||
Title: | USN-2433-1 -- tcpdump vulnerabilities | ||
Description: | Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8767">CVE-2014-8767</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8768">CVE-2014-8768</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing AODV packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, reveal sensitive information, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8769">CVE-2014-8769</a>) It was discovered that tcpdump incorrectly handled printing PPP packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9140">CVE-2014-9140</a>) In the default installation, attackers would be isolated by the tcpdump AppArmor profile. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2433-1 CVE-2014-8767 CVE-2014-8768 CVE-2014-8769 CVE-2014-9140 | Version: | 5 |
Platform(s): | Ubuntu 14.10 Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28411 | |||
Oval ID: | oval:org.mitre.oval:def:28411 | ||
Title: | DSA-3086-1 -- tcpdump security update | ||
Description: | Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3086-1 CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-09-08 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1180.nasl - Type : ACT_GATHER_INFO |
2017-09-08 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2017-1179.nasl - Type : ACT_GATHER_INFO |
2017-08-25 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2017-1871.nasl - Type : ACT_GATHER_INFO |
2017-08-22 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20170801_tcpdump_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2017-08-09 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2017-1871.nasl - Type : ACT_GATHER_INFO |
2017-08-03 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2017-1871.nasl - Type : ACT_GATHER_INFO |
2017-05-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-557.nasl - Type : ACT_GATHER_INFO |
2017-04-27 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-1110-1.nasl - Type : ACT_GATHER_INFO |
2015-11-02 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201510-04.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO |
2015-07-08 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-557.nasl - Type : ACT_GATHER_INFO |
2015-04-28 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2580-1.nasl - Type : ACT_GATHER_INFO |
2015-04-20 | Name : The remote Fedora host is missing a security update. File : fedora_2015-4953.nasl - Type : ACT_GATHER_INFO |
2015-04-09 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tcpdump-150320.nasl - Type : ACT_GATHER_INFO |
2015-04-03 | Name : The remote Fedora host is missing a security update. File : fedora_2015-4804.nasl - Type : ACT_GATHER_INFO |
2015-03-31 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2015-182.nasl - Type : ACT_GATHER_INFO |
2015-03-31 | Name : The remote Fedora host is missing a security update. File : fedora_2015-4939.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-267.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2015-125.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-174.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-102.nasl - Type : ACT_GATHER_INFO |
2015-03-18 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3193.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201502-05.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16823.nasl - Type : ACT_GATHER_INFO |
2014-12-18 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16861.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-240.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2433-1.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3086.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-03-26 09:30:40 |
|
2015-03-26 00:34:26 |
|
2015-03-24 21:30:46 |
|
2015-03-19 13:28:26 |
|
2015-03-17 17:24:38 |
|