Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These security vulnerabilities might result in denial of service or, potentially, execution of arbitrary code.
For Debian 8 ‘Jessie’, these problems have been fixed in version 4.9.3-1~deb8u1.
We recommend that you upgrade your tcpdump packages.
NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-1955-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(129828);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166");
script_name(english:"Debian DLA-1955-1 : tcpdump security update");
script_summary(english:"Checks dpkg output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in tcpdump, a
command-line network traffic analyzer. These security vulnerabilities
might result in denial of service or, potentially, execution of
arbitrary code.
For Debian 8 'Jessie', these problems have been fixed in version
4.9.3-1~deb8u1.
We recommend that you upgrade your tcpdump packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/jessie/tcpdump"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade the affected tcpdump package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:tcpdump");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/03");
script_set_attribute(attribute:"patch_publication_date", value:"2019/10/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/14");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"8.0", prefix:"tcpdump", reference:"4.9.3-1~deb8u1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version |
---|---|---|
debian | debian_linux | tcpdump |
debian | debian_linux | 8.0 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14462
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14464
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14466
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14467
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14468
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14469
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14470
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14879
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14880
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14881
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14882
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16229
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16230
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16451
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15166
lists.debian.org/debian-lts-announce/2019/10/msg00015.html
packages.debian.org/source/jessie/tcpdump