Home > Security > Advisories

Advisories

Mandriva Advisories

Package name tcpdump
Date May 11th, 2005
Advisory ID MDKSA-2005:087
Affected versions 10.0, 10.1, CS2.1, CS3.0, 10.2
Synopsis Updated tcpdump packages fix multiple vulnerabilities

Problem Description

A number of Denial of Service vulnerabilities were discovered in the
way that tcpdump processes certain network packets. If abused, these
flaws can allow a remote attacker to inject a carefully crafted packet
onto the network, crashing tcpdump.

The provided packages have been patched to correct these issues.

Updated Packages

Mandrakelinux 10.0

 e73bd8a6947c3685f0a1dcd370103a2d  10.0/RPMS/tcpdump-3.8.1-1.2.100mdk.i586.rpm
1e36745b1695e0272989183d00489401  10.0/SRPMS/tcpdump-3.8.1-1.2.100mdk.src.rpm

Mandrakelinux 10.0/AMD64

 49a077ec66ad00b73e7448328ef86b44  amd64/10.0/RPMS/tcpdump-3.8.1-1.2.100mdk.amd64.rpm
1e36745b1695e0272989183d00489401  amd64/10.0/SRPMS/tcpdump-3.8.1-1.2.100mdk.src.rpm

Mandrakelinux 10.1

 67d319eed39f1bafb30a25e57f7add2a  10.1/RPMS/tcpdump-3.8.3-2.1.101mdk.i586.rpm
9367b2c7064311b7552a516c71da2335  10.1/SRPMS/tcpdump-3.8.3-2.1.101mdk.src.rpm

Mandrakelinux 10.1/X86_64

 797c8b13a984821bf42b3a1ff1f0606f  x86_64/10.1/RPMS/tcpdump-3.8.3-2.1.101mdk.x86_64.rpm
9367b2c7064311b7552a516c71da2335  x86_64/10.1/SRPMS/tcpdump-3.8.3-2.1.101mdk.src.rpm

Corporate Server 2.1

 aa300032c33e2bbe3f4a164a0202c410  corporate/2.1/RPMS/tcpdump-3.7.2-2.3.C21mdk.i586.rpm
d56843af254ecdebf9c047f6fb903149  corporate/2.1/SRPMS/tcpdump-3.7.2-2.3.C21mdk.src.rpm

Corporate Server 2.1/X86_64

 d539efda2769654b6a7368b74565d613  x86_64/corporate/2.1/RPMS/tcpdump-3.7.2-2.3.C21mdk.x86_64.rpm
d56843af254ecdebf9c047f6fb903149  x86_64/corporate/2.1/SRPMS/tcpdump-3.7.2-2.3.C21mdk.src.rpm

Corporate Server 3.0

 df9e3b52c36c3a68aa3c5a12464dfa33  corporate/3.0/RPMS/tcpdump-3.8.1-1.2.C30mdk.i586.rpm
13100cead5f5b078e0b3249d1f522339  corporate/3.0/SRPMS/tcpdump-3.8.1-1.2.C30mdk.src.rpm

Corporate Server 3.0/X86_64

 69a3d5fc2be9891eaeea2d1a0ebbfc09  x86_64/corporate/3.0/RPMS/tcpdump-3.8.1-1.2.C30mdk.x86_64.rpm
13100cead5f5b078e0b3249d1f522339  x86_64/corporate/3.0/SRPMS/tcpdump-3.8.1-1.2.C30mdk.src.rpm

Mandriva Linux LE2005

 5e3b9eaf014d072536aee3d4153149fd  10.2/RPMS/tcpdump-3.8.3-2.1.102mdk.i586.rpm
a84d58a6c8e197106db7550b89cd7bc9  10.2/SRPMS/tcpdump-3.8.3-2.1.102mdk.src.rpm

Mandriva Linux LE2005/X86_64

 46175965cf9fe968060f04212469403d  x86_64/10.2/RPMS/tcpdump-3.8.3-2.1.102mdk.x86_64.rpm
a84d58a6c8e197106db7550b89cd7bc9  x86_64/10.2/SRPMS/tcpdump-3.8.3-2.1.102mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1279
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1280

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.