RHSA-2004:219-01: Updated tcpdump packages fix various vulnerabilities
Posted on: 05/26/2004 03:01 AM

Updated tcpdump packages are available for Red Hat Enterprise Linux

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated tcpdump packages fix various vulnerabilities
Advisory ID: RHSA-2004:219-01
Issue date: 2004-05-26
Updated on: 2004-05-26
Product: Red Hat Enterprise Linux
Keywords: tcpdump buffer overflow libpcap arpwatch
Cross references:
Obsoletes: RHSA-2004:008-09
CVE Names: CAN-2004-0183 CAN-2004-0184
- ---------------------------------------------------------------------

1. Topic:

Updated tcpdump, libpcap, and arpwatch packages fix vulnerabilities in ISAKMP parsing.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Tcpdump is a command-line tool for monitoring network traffic.

Tcpdump v3.8.1 and earlier versions contained multiple flaws in the packet display functions for the ISAKMP protocol. Upon receiving specially crafted ISAKMP packets, TCPDUMP would try to read beyond the end of the packet capture buffer and subsequently crash.

Users of tcpdump are advised to upgrade to these erratum packages, which contain backported security patches and are not vulnerable to these issues.

4. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

123030 - CAN-2004-0183/0184 tcpdump ISAKMP crash
120022 - CAN-2004-0183/0184 tcpdump ISAKMP crash

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

ia64:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.ia64.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/tcpdump-3.6.2-12.2.1AS.6.src.rpm

i386:
Available from Red Hat Network: arpwatch-2.1a11-12.2.1AS.6.i386.rpm
Available from Red Hat Network: libpcap-0.6.2-12.2.1AS.6.i386.rpm
Available from Red Hat Network: tcpdump-3.6.2-12.2.1AS.6.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

ppc:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc.rpm

ppc64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ppc64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ppc64.rpm

s390:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390.rpm

s390x:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.s390x.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.s390x.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/tcpdump-3.7.2-7.E3.2.src.rpm

i386:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.i386.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.i386.rpm

ia64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.ia64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.ia64.rpm

x86_64:
Available from Red Hat Network: libpcap-0.7.2-7.E3.2.x86_64.rpm
Available from Red Hat Network: tcpdump-3.7.2-7.E3.2.x86_64.rpm



7. Verification:

MD5 sum Package Name
- --------------------------------------------------------------------------
39785de17ac747a95d75c3856ce10a8f arpwatch-2.1a11-12.2.1AS.6.i386.rpm
6251264976756412d80f74041e5c277a arpwatch-2.1a11-12.2.1AS.6.ia64.rpm
2d79602baa89bd6070541e7ac0fb3ea8 libpcap-0.6.2-12.2.1AS.6.i386.rpm
d86bb232ba584afe8a55f02d7e789d93 libpcap-0.6.2-12.2.1AS.6.ia64.rpm
d463f8099c444830358bf8f6b8f57be3 libpcap-0.7.2-7.E3.2.i386.rpm
4c6ddd5421cc23a43735e014e54be67e libpcap-0.7.2-7.E3.2.ia64.rpm
cfb803a434669955505e83d759865c1b libpcap-0.7.2-7.E3.2.ppc.rpm
4c931b56f4eedea44f2e01603842bcff libpcap-0.7.2-7.E3.2.ppc64.rpm
5b0085309d79b6dc81373b1a8d028699 libpcap-0.7.2-7.E3.2.s390.rpm
690139912f28e6c5db35115389bab7fe libpcap-0.7.2-7.E3.2.s390x.rpm
a47644862b993c272d73d5982b6a0f72 libpcap-0.7.2-7.E3.2.x86_64.rpm
8c592a8b97f599bf12c7bc0335422107 tcpdump-3.6.2-12.2.1AS.6.i386.rpm
2bbc2c761f382bba8d8693b131239541 tcpdump-3.6.2-12.2.1AS.6.ia64.rpm
06099571cae2217649509843c705a153 tcpdump-3.6.2-12.2.1AS.6.src.rpm
1b6524ff06794b8aed95acfea00ebfa7 tcpdump-3.7.2-7.E3.2.i386.rpm
34fbc4a48e7f7f3471aa9ed82706e20f tcpdump-3.7.2-7.E3.2.ia64.rpm
011624c4af4fc835ff0d5c06c729eaa2 tcpdump-3.7.2-7.E3.2.ppc.rpm
0217bb2ee74895ffb00be005126935e3 tcpdump-3.7.2-7.E3.2.ppc64.rpm
cca41d020017136662ac065eb9720987 tcpdump-3.7.2-7.E3.2.s390.rpm
0615c37cea73f9f060fa45ae6a32f93e tcpdump-3.7.2-7.E3.2.s390x.rpm
8245acfffe0d89c4381885f71e0ece3f tcpdump-3.7.2-7.E3.2.src.rpm
b6694e17a21f612abf6e7d8e94dd50fe tcpdump-3.7.2-7.E3.2.x86_64.rpm


These packages are GPG signed by Red Hat for security. Our key is available from https://www.redhat.com/security/team/key.html

You can verify each package with the following command:

rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:

md5sum <filename>


8. References:

http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184
http://marc.theaimsgroup.com/?l=bugtraqm=108067265931525w=2
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184

9. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.


Printed from Linux Compatible (http://www.linuxcompatible.org/news/story/rhsa_2004219_01_updated_tcpdump_packages_fix_various_vulnerabilities.html)