patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			130 lines
		
	
	
	
		
			4.5 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			130 lines
		
	
	
	
		
			4.5 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| -----BEGIN PGP SIGNED MESSAGE-----
 | |
| 
 | |
| =============================================================================
 | |
| FreeBSD-SA-01:48                                           Security Advisory
 | |
|                                                                 FreeBSD, Inc.
 | |
| 
 | |
| Topic:          tcpdump contains remote buffer overflow
 | |
| 
 | |
| Category:       core
 | |
| Module:         tcpdump
 | |
| Announced:      2001-07-17
 | |
| Credits:        Nick Cleaton <nick@cleaton.net>
 | |
| Affects:        All releases of FreeBSD 4.x prior to 4.4,
 | |
|                 FreeBSD 4.3-STABLE prior to the correction date
 | |
| 		FreeBSD 3.x is unaffected.
 | |
| Corrected:      2001-07-09
 | |
| Vendor status:  Patch released
 | |
| FreeBSD only:   NO
 | |
| 
 | |
| I.   Background
 | |
| 
 | |
| tcpdump is a tool for monitoring network traffic activity.
 | |
| 
 | |
| II.  Problem Description
 | |
| 
 | |
| An overflowable buffer was found in the version of tcpdump included
 | |
| with FreeBSD 4.x.  Due to incorrect string length handling in the
 | |
| decoding of AFS RPC packets, a remote user may be able to overflow a
 | |
| buffer causing the local tcpdump process to crash.  In addition, it
 | |
| may be possible to execute arbitrary code with the privileges of the
 | |
| user running tcpdump, often root.
 | |
| 
 | |
| The effects of this vulnerability are similiar to those described in
 | |
| advisory FreeBSD-SA-00:61.tcpdump.v1.1.
 | |
| 
 | |
| All released versions of FreeBSD prior to the correction date
 | |
| including 4.3-RELEASE are vulnerable to this problem, however it does
 | |
| not affect the FreeBSD 3.x branch which includes an older version of
 | |
| tcpdump.
 | |
| 
 | |
| III. Impact
 | |
| 
 | |
| Remote users can cause the local tcpdump process to crash, and may be
 | |
| able to cause arbitrary code to be executed as the user running
 | |
| tcpdump, often root.
 | |
| 
 | |
| IV.  Workaround
 | |
| 
 | |
| Do not use vulnerable versions of tcpdump in network environments
 | |
| which may contain packets from untrusted sources.
 | |
| 
 | |
| V.   Solution
 | |
| 
 | |
| One of the following:
 | |
| 
 | |
| 1) Upgrade your vulnerable FreeBSD system to 4.3-STABLE or the
 | |
| RELENG_4_3 security branch after the respective correction dates.
 | |
| 
 | |
| 2) FreeBSD 4.x systems prior to the correction date:
 | |
| 
 | |
| Download the patch and the detached PGP signature from the following
 | |
| locations, and verify the signature using your PGP utility.
 | |
| 
 | |
| ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-01:48/tcpdump-4.x.patch
 | |
| ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-01:48/tcpdump-4.x.patch.asc
 | |
| 
 | |
| # cd /usr/src/contrib/tcpdump
 | |
| # patch -p < /path/to/patch
 | |
| # cd /usr/src/usr.sbin/tcpdump
 | |
| # make depend && make all install
 | |
| 
 | |
| 3) FreeBSD 4.3-RELEASE systems:
 | |
| 
 | |
| An experimental upgrade package is available for users who wish to
 | |
| provide testing and feedback on the binary upgrade process.  This
 | |
| package may be installed on FreeBSD 4.3-RELEASE systems only, and is
 | |
| intended for use on systems for which source patching is not practical
 | |
| or convenient.
 | |
| 
 | |
| If you use the upgrade package, feedback (positive or negative) is
 | |
| requested to security-officer@FreeBSD.org so we can improve the
 | |
| process for future advisories.
 | |
| 
 | |
| During the installation procedure, backup copies are made of the files
 | |
| which are replaced by the package.  These backup copies will be
 | |
| reinstalled if the package is removed, reverting the system to a
 | |
| pre-patched state.
 | |
| 
 | |
| Two versions of the upgrade package are available, depending on
 | |
| whether or not the system has openssl installed.  To verify whether
 | |
| your system has openssl installed, perform the following command:
 | |
| 
 | |
| # ls /usr/bin/openssl
 | |
| 
 | |
| Possible responses:
 | |
| 
 | |
| /usr/bin/openssl       # This response indicates you have openssl present
 | |
| 
 | |
| ls: /usr/bin/openssl: No such file or directory
 | |
|                        # This reponse indicates you do not have
 | |
|                        # openssl present
 | |
| 
 | |
| 3a) If OpenSSL is not present
 | |
| 
 | |
| # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-01:48/security-patch-tcpdump-nossl-01.48.tgz
 | |
| # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-01:48/security-patch-tcpdump-nossl-01.48.tgz.asc
 | |
| 
 | |
| Verify the detached PGP signature using your PGP utility.
 | |
| 
 | |
| # pkg_add security-patch-tcpdump-nossl-01.48.tgz
 | |
| 
 | |
| 3b) If OpenSSL is present
 | |
| 
 | |
| # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-01:48/security-patch-tcpdump-ssl-01.48.tgz
 | |
| # fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/packages/SA-01:48/security-patch-tcpdump-ssl-01.48.tgz.asc
 | |
| 
 | |
| Verify the detached PGP signature using your PGP utility.
 | |
| 
 | |
| # pkg_add security-patch-tcpdump-ssl-01.48.tgz
 | |
| 
 | |
| -----BEGIN PGP SIGNATURE-----
 | |
| Version: GnuPG v1.0.6 (FreeBSD)
 | |
| Comment: For info see http://www.gnupg.org
 | |
| 
 | |
| iQCVAwUBO1R5i1UuHi5z0oilAQFdCQQAhFUzYA7plZN1O0rK/iU/jPaoCqM0KDPP
 | |
| Vdg+3zP8I5Vovdbxdns1DVefI3PVhZbLwh8E0ZnEz544FB5atiYsRiqQxuoEMZiN
 | |
| 1JSRHUOIYyAChtIUZY1JV9eF8GfemWaAcgNp7mNWYKl7dUn0nYERfTO92YNm+l7M
 | |
| 3nNvOwkhqLU=
 | |
| =PrXC
 | |
| -----END PGP SIGNATURE-----
 |