SuSE 11.3 Security Update : tcpdump (SAT Patch Number 10509)

high Nessus Plugin ID 82658

Synopsis

The remote SuSE 11 host is missing a security update.

Description

When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network.

The following vulnerabilities in protocol printers have been fixed :

- IPv6 mobility printer remote DoS. (CVE-2015-0261, bnc#922220)

- Ethernet printer remote DoS. (CVE-2015-2154, bnc#922222)

- PPP printer remote DoS (CVE-2014-9140, bnc#923142)

Solution

Apply SAT patch number 10509.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=922220

https://bugzilla.novell.com/show_bug.cgi?id=922222

https://bugzilla.novell.com/show_bug.cgi?id=923142

http://support.novell.com/security/cve/CVE-2014-9140.html

http://support.novell.com/security/cve/CVE-2015-0261.html

http://support.novell.com/security/cve/CVE-2015-2154.html

Plugin Details

Severity: High

ID: 82658

File Name: suse_11_tcpdump-150320.nasl

Version: 1.2

Type: local

Agent: unix

Published: 4/9/2015

Updated: 1/6/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:tcpdump

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 3/20/2015

Reference Information

CVE: CVE-2014-9140, CVE-2015-0261, CVE-2015-2154