patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			96 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			96 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
-----BEGIN PGP SIGNED MESSAGE-----
 | 
						|
 | 
						|
=============================================================================
 | 
						|
FreeBSD-SA-02:29                                            Security Advisory
 | 
						|
                                                          The FreeBSD Project
 | 
						|
 | 
						|
Topic:          Buffer overflow in tcpdump when handling NFS packets
 | 
						|
 | 
						|
Category:       contrib
 | 
						|
Module:         tcpdump
 | 
						|
Announced:      2002-07-12
 | 
						|
Credits:        dwmw2@redhat.com
 | 
						|
Affects:        All releases prior to and including 4.6-RELEASE
 | 
						|
                FreeBSD 4.6-STABLE prior to the correction date
 | 
						|
Corrected:      2002-07-05 13:24:57 UTC (RELENG_4)
 | 
						|
                2002-07-12 13:29:47 UTC (RELENG_4_6)
 | 
						|
                2002-07-12 13:31:10 UTC (RELENG_4_5)
 | 
						|
                2002-07-12 13:31:44 UTC (RELENG_4_4)
 | 
						|
FreeBSD only:   NO
 | 
						|
 | 
						|
I.   Background
 | 
						|
 | 
						|
The tcpdump utility is used to capture and examining network traffic.
 | 
						|
 | 
						|
II.  Problem Description
 | 
						|
 | 
						|
Versions of tcpdump up to and including 3.7.1 contain a buffer
 | 
						|
overflow that may be triggered by badly formed NFS packets, and
 | 
						|
possibly other types of packets.
 | 
						|
 | 
						|
III. Impact
 | 
						|
 | 
						|
It is not currently known whether this buffer overflow is exploitable.
 | 
						|
If it were, an attacker could inject specially crafted packets into
 | 
						|
the network which, when processed by tcpdump, could lead to arbitrary
 | 
						|
code execution with the privileges of the user running tcpdump
 | 
						|
(typically `root').
 | 
						|
 | 
						|
IV.  Workaround
 | 
						|
 | 
						|
There is no workaround, other than not using tcpdump.
 | 
						|
 | 
						|
V.   Solution
 | 
						|
 | 
						|
Do one of the following:
 | 
						|
 | 
						|
1) Upgrade your vulnerable system to 4.6-STABLE; or to the RELENG_4_6,
 | 
						|
RELENG_4_5, or RELENG_4_4 security branch dated after the correction
 | 
						|
date (4.6-RELEASE-p2, 4.5-RELEASE-p8, or 4.4-RELEASE-p15).
 | 
						|
 | 
						|
2) To patch your present system:
 | 
						|
 | 
						|
The following patch has been verified to apply to FreeBSD 4.4, 4.5, and
 | 
						|
4.6 systems.
 | 
						|
 | 
						|
a) Download the relevant patch from the location below, and verify the
 | 
						|
detached PGP signature using your PGP utility.
 | 
						|
 | 
						|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:29/tcpdump.patch
 | 
						|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:29/tcpdump.patch.asc
 | 
						|
 | 
						|
b) Execute the following commands as root:
 | 
						|
 | 
						|
# cd /usr/src
 | 
						|
# patch < /path/to/patch
 | 
						|
# cd /usr/src/usr.sbin/tcpdump
 | 
						|
# make depend && make && make install
 | 
						|
 | 
						|
VI.  Correction details
 | 
						|
 | 
						|
The following list contains the revision numbers of each file that was
 | 
						|
corrected in FreeBSD.
 | 
						|
 | 
						|
Path                                                             Revision
 | 
						|
  Branch
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
src/contrib/tcpdump/interface.h
 | 
						|
  RELENG_4                                                        1.4.2.3
 | 
						|
  RELENG_4_6                                                  1.4.2.1.6.1
 | 
						|
  RELENG_4_5                                                  1.4.2.1.4.1
 | 
						|
  RELENG_4_4                                                  1.4.2.1.2.1
 | 
						|
- -------------------------------------------------------------------------
 | 
						|
 | 
						|
VII. References
 | 
						|
 | 
						|
<URL:http://rhn.redhat.com/errata/RHSA-2002-094.html>
 | 
						|
<URL:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55145>
 | 
						|
-----BEGIN PGP SIGNATURE-----
 | 
						|
Version: GnuPG v1.0.7 (FreeBSD)
 | 
						|
 | 
						|
iQCVAwUBPS8+yFUuHi5z0oilAQGEaAQApQpuobpvrYILjiJh9Zvfnupop9aDuQ/G
 | 
						|
9RvnGVv0ZXrKtD8aRiP3JrjouGvZm9WLqXsXlnf0wmTXdWWg5ibjuJK/gDtdiqjA
 | 
						|
iuZvq5Rx+IKD33pZpAocg74zIv3nDYv1S+3ndJXtYcSFw7EnC4QHu3mFrZK81RcQ
 | 
						|
6LpcUuxVTl8=
 | 
						|
=hQ/2
 | 
						|
-----END PGP SIGNATURE-----
 |