FreeBSD : FreeBSD -- Buffer overflow in tcpdump(1) (2dc764fa-40c0-11dc-aeac-02e0185f8d72)

medium Nessus Plugin ID 25833

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

An un-checked return value in the BGP dissector code can result in an integer overflow. This value is used in subsequent buffer management operations, resulting in a stack based buffer overflow under certain circumstances. Impact : By crafting malicious BGP packets, an attacker could exploit this vulnerability to execute code or crash the tcpdump process on the target system. This code would be executed in the context of the user running tcpdump(1). It should be noted that tcpdump(1) requires privileges in order to open live network interfaces. Workaround : No workaround is available.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?0a06af06

Plugin Details

Severity: Medium

ID: 25833

File Name: freebsd_pkg_2dc764fa40c011dcaeac02e0185f8d72.nasl

Version: 1.14

Type: local

Published: 8/2/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:tcpdump, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/2/2007

Vulnerability Publication Date: 8/1/2007

Reference Information

CVE: CVE-2007-3798

BID: 24965

CWE: 189

FreeBSD: SA-07:06.tcpdump