Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#7684 - Warning on tcpdump

Attached to Project: Arch Linux
Opened by DaNiMoTh (DaNiMoTh) - Thursday, 26 July 2007, 09:42 GMT
Last edited by Eric Belanger (Snowman) - Friday, 27 July 2007, 00:48 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Aaron Griffin (phrakture)
Architecture All
Severity Medium
Priority Normal
Reported Version 2007.05 Duke
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#33
------------------------------------------------------------

Name: tcpdump
Date: 2007-07-25
Severity: Medium
Warning #: 2007-#33

------------------------------------------------------------

Product Background
===================
A tool for network monitoring and data acquisition

Problem Background
===================
The return value of a call to snprintf is not sanitized before being used in an addition to calculate the number of bytes remaining the buffer within a loop.
The result is a remotely exploitable buffer overflow since the length
calculation will eventually underflow and thus make the length parameter of subsequent snprintf calls irrelevant.

Impact
==================
A remote attacker could execute arbitrary code.

Problem Packages
===================
Package: tcpdump
Repo: current
Group: network
Unsafe: < 3.9.7
Safe: >= 3.9.7

Package Fix
===================
Upgrade to 3.9.7

===================

Unofficial ArchLinux Security Bug Tracker:
http://jjdanimoth.netsons.org/alsw.html

Reference(s)
===================
http://bugs.gentoo.org/show_bug.cgi?id=184815
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3798
This task depends upon

Closed by  Eric Belanger (Snowman)
Friday, 27 July 2007, 00:48 GMT
Reason for closing:  Fixed
Additional comments about closing:  now rebuilt for x86_64
Comment by Dan McGee (toofishes) - Thursday, 26 July 2007, 23:37 GMT
Taken care of on the i686 side, x86_64 still needs to rebuild.

Loading...