SuSE9 Security Update : tcpdump (YOU Patch Number 11696)

medium Nessus Plugin ID 41144

Synopsis

The remote SuSE 9 host is missing a security-related patch.

Description

A buffer overflow has been found in tcpdump which can be triggered while displaying BGP packets. This could be exploited by an attacker to execute malicious code under the privileges of the user running tcpdump by presenting specially prepared BGP packets to tcpdump. This issue is tracked by CVE-2007-3798.

Solution

Apply YOU patch number 11696.

See Also

http://support.novell.com/security/cve/CVE-2007-3798.html

Plugin Details

Severity: Medium

ID: 41144

File Name: suse9_11696.nasl

Version: 1.8

Type: local

Agent: unix

Published: 9/24/2009

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 8/7/2007

Reference Information

CVE: CVE-2007-3798

CWE: 189