Slackware 10.0 / 10.1 / 8.1 / 9.0 / 9.1 / current : tcpdump DoS (SSA:2005-195-10)

medium Nessus Plugin ID 19209

Synopsis

The remote Slackware host is missing a security update.

Description

New tcpdump packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, and -current to fix a security issue. A specially crafted BGP packet can cause tcpdump to go into an infinite loop, creating a denial of service where network monitoring is disabled.

Solution

Update the affected tcpdump package.

See Also

http://www.nessus.org/u?ce972d2c

Plugin Details

Severity: Medium

ID: 19209

File Name: Slackware_SSA_2005-195-10.nasl

Version: 1.16

Type: local

Published: 7/16/2005

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:tcpdump, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:10.0, cpe:/o:slackware:slackware_linux:10.1, cpe:/o:slackware:slackware_linux:8.1, cpe:/o:slackware:slackware_linux:9.0, cpe:/o:slackware:slackware_linux:9.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Patch Publication Date: 7/14/2005

Vulnerability Publication Date: 6/8/2005

Reference Information

CVE: CVE-2005-1267

SSA: 2005-195-10