patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
96 lines
3.3 KiB
Text
96 lines
3.3 KiB
Text
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
=============================================================================
|
|
FreeBSD-SA-02:29 Security Advisory
|
|
The FreeBSD Project
|
|
|
|
Topic: Buffer overflow in tcpdump when handling NFS packets
|
|
|
|
Category: contrib
|
|
Module: tcpdump
|
|
Announced: 2002-07-12
|
|
Credits: dwmw2@redhat.com
|
|
Affects: All releases prior to and including 4.6-RELEASE
|
|
FreeBSD 4.6-STABLE prior to the correction date
|
|
Corrected: 2002-07-05 13:24:57 UTC (RELENG_4)
|
|
2002-07-12 13:29:47 UTC (RELENG_4_6)
|
|
2002-07-12 13:31:10 UTC (RELENG_4_5)
|
|
2002-07-12 13:31:44 UTC (RELENG_4_4)
|
|
FreeBSD only: NO
|
|
|
|
I. Background
|
|
|
|
The tcpdump utility is used to capture and examining network traffic.
|
|
|
|
II. Problem Description
|
|
|
|
Versions of tcpdump up to and including 3.7.1 contain a buffer
|
|
overflow that may be triggered by badly formed NFS packets, and
|
|
possibly other types of packets.
|
|
|
|
III. Impact
|
|
|
|
It is not currently known whether this buffer overflow is exploitable.
|
|
If it were, an attacker could inject specially crafted packets into
|
|
the network which, when processed by tcpdump, could lead to arbitrary
|
|
code execution with the privileges of the user running tcpdump
|
|
(typically `root').
|
|
|
|
IV. Workaround
|
|
|
|
There is no workaround, other than not using tcpdump.
|
|
|
|
V. Solution
|
|
|
|
Do one of the following:
|
|
|
|
1) Upgrade your vulnerable system to 4.6-STABLE; or to the RELENG_4_6,
|
|
RELENG_4_5, or RELENG_4_4 security branch dated after the correction
|
|
date (4.6-RELEASE-p2, 4.5-RELEASE-p8, or 4.4-RELEASE-p15).
|
|
|
|
2) To patch your present system:
|
|
|
|
The following patch has been verified to apply to FreeBSD 4.4, 4.5, and
|
|
4.6 systems.
|
|
|
|
a) Download the relevant patch from the location below, and verify the
|
|
detached PGP signature using your PGP utility.
|
|
|
|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:29/tcpdump.patch
|
|
# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-02:29/tcpdump.patch.asc
|
|
|
|
b) Execute the following commands as root:
|
|
|
|
# cd /usr/src
|
|
# patch < /path/to/patch
|
|
# cd /usr/src/usr.sbin/tcpdump
|
|
# make depend && make && make install
|
|
|
|
VI. Correction details
|
|
|
|
The following list contains the revision numbers of each file that was
|
|
corrected in FreeBSD.
|
|
|
|
Path Revision
|
|
Branch
|
|
- -------------------------------------------------------------------------
|
|
src/contrib/tcpdump/interface.h
|
|
RELENG_4 1.4.2.3
|
|
RELENG_4_6 1.4.2.1.6.1
|
|
RELENG_4_5 1.4.2.1.4.1
|
|
RELENG_4_4 1.4.2.1.2.1
|
|
- -------------------------------------------------------------------------
|
|
|
|
VII. References
|
|
|
|
<URL:http://rhn.redhat.com/errata/RHSA-2002-094.html>
|
|
<URL:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=55145>
|
|
-----BEGIN PGP SIGNATURE-----
|
|
Version: GnuPG v1.0.7 (FreeBSD)
|
|
|
|
iQCVAwUBPS8+yFUuHi5z0oilAQGEaAQApQpuobpvrYILjiJh9Zvfnupop9aDuQ/G
|
|
9RvnGVv0ZXrKtD8aRiP3JrjouGvZm9WLqXsXlnf0wmTXdWWg5ibjuJK/gDtdiqjA
|
|
iuZvq5Rx+IKD33pZpAocg74zIv3nDYv1S+3ndJXtYcSFw7EnC4QHu3mFrZK81RcQ
|
|
6LpcUuxVTl8=
|
|
=hQ/2
|
|
-----END PGP SIGNATURE-----
|