RHEL 2.1 : tcpdump (RHSA-2003:151)

medium Nessus Plugin ID 12392

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated tcpdump packages that fix an infinite loop vulnerability and drop privileges on startup are now available.

Tcpdump is a command-line tool for monitoring network traffic.

A vulnerability exists in tcpdump before 3.7.2 and is related to an inability to handle unknown RADIUS attributes properly. This vulnerability allows remote attackers to cause a denial of service (infinite loop).

The Red Hat tcpdump packages advertise that, by default, tcpdump will drop privileges to user 'pcap'. Due to a compilation error this did not happen, and tcpdump would run as root unless the '-U' flag was specified.

Users of tcpdump are advised to upgrade to these errata packages, which contain a patch correcting the RADIUS issue and are compiled so that by default tcpdump will drop privileges to the 'pcap' user.

Solution

Update the affected arpwatch, libpcap and / or tcpdump packages.

See Also

https://access.redhat.com/security/cve/cve-2003-0145

https://access.redhat.com/security/cve/cve-2003-0194

http://www.tcpdump.org/tcpdump-changes.txt

https://access.redhat.com/errata/RHSA-2003:151

Plugin Details

Severity: Medium

ID: 12392

File Name: redhat-RHSA-2003-151.nasl

Version: 1.28

Type: local

Agent: unix

Published: 7/6/2004

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:arpwatch, cpe:/o:redhat:enterprise_linux:2.1, p-cpe:/a:redhat:enterprise_linux:libpcap, p-cpe:/a:redhat:enterprise_linux:tcpdump

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 6/9/2003

Vulnerability Publication Date: 3/31/2003

Reference Information

CVE: CVE-2003-0145, CVE-2003-0194

RHSA: 2003:151