Lucene search

K
slackwareSlackware Linux ProjectSSA-2017-041-04
HistoryFeb 10, 2017 - 9:09 p.m.

[slackware-security] tcpdump

2017-02-1021:09:44
Slackware Linux Project
www.slackware.com
21

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.378 Low

EPSS

Percentile

97.2%

New tcpdump packages are available for Slackware 13.37, 14.0, 14.1, 14.2,
and -current to fix security issues.

NOTE: These updates also require the updated libpcap package.

Here are the details from the Slackware 14.2 ChangeLog:

patches/packages/tcpdump-4.9.0-i586-1_slack14.2.txz: Upgraded.
Fixed bugs which allow an attacker to crash tcpdump (denial of service).
For more information, see:
https://vulners.com/cve/CVE-2016-7922
https://vulners.com/cve/CVE-2016-7923
https://vulners.com/cve/CVE-2016-7924
https://vulners.com/cve/CVE-2016-7925
https://vulners.com/cve/CVE-2016-7926
https://vulners.com/cve/CVE-2016-7927
https://vulners.com/cve/CVE-2016-7928
https://vulners.com/cve/CVE-2016-7929
https://vulners.com/cve/CVE-2016-7930
https://vulners.com/cve/CVE-2016-7931
https://vulners.com/cve/CVE-2016-7932
https://vulners.com/cve/CVE-2016-7933
https://vulners.com/cve/CVE-2016-7934
https://vulners.com/cve/CVE-2016-7935
https://vulners.com/cve/CVE-2016-7936
https://vulners.com/cve/CVE-2016-7937
https://vulners.com/cve/CVE-2016-7938
https://vulners.com/cve/CVE-2016-7939
https://vulners.com/cve/CVE-2016-7940
https://vulners.com/cve/CVE-2016-7973
https://vulners.com/cve/CVE-2016-7974
https://vulners.com/cve/CVE-2016-7975
https://vulners.com/cve/CVE-2016-7983
https://vulners.com/cve/CVE-2016-7984
https://vulners.com/cve/CVE-2016-7985
https://vulners.com/cve/CVE-2016-7986
https://vulners.com/cve/CVE-2016-7992
https://vulners.com/cve/CVE-2016-7993
https://vulners.com/cve/CVE-2016-8574
https://vulners.com/cve/CVE-2016-8575
https://vulners.com/cve/CVE-2017-5202
https://vulners.com/cve/CVE-2017-5203
https://vulners.com/cve/CVE-2017-5204
https://vulners.com/cve/CVE-2017-5205
https://vulners.com/cve/CVE-2017-5341
https://vulners.com/cve/CVE-2017-5342
https://vulners.com/cve/CVE-2017-5482
https://vulners.com/cve/CVE-2017-5483
https://vulners.com/cve/CVE-2017-5484
https://vulners.com/cve/CVE-2017-5485
https://vulners.com/cve/CVE-2017-5486
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/tcpdump-4.9.0-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/tcpdump-4.9.0-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/tcpdump-4.9.0-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/tcpdump-4.9.0-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/tcpdump-4.9.0-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/tcpdump-4.9.0-x86_64-1_slack14.1.txz

Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/tcpdump-4.9.0-i586-1_slack14.2.txz

Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/tcpdump-4.9.0-x86_64-1_slack14.2.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/tcpdump-4.9.0-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/tcpdump-4.9.0-x86_64-1.txz

MD5 signatures:

Slackware 13.37 package:
9511f62c56fca52c1a5e7e3c019d13f1 tcpdump-4.9.0-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
363eedb14f568d59285421ab73854543 tcpdump-4.9.0-x86_64-1_slack13.37.txz

Slackware 14.0 package:
e4a3e6529f2d183e64abec02b6336fc1 tcpdump-4.9.0-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
4025510be6f69f299f2d2775a4eed86e tcpdump-4.9.0-x86_64-1_slack14.0.txz

Slackware 14.1 package:
b693f072d9ce8e1e2f542e05c049ac8b tcpdump-4.9.0-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
76109f2cf611d5a040db9d5d04628cae tcpdump-4.9.0-x86_64-1_slack14.1.txz

Slackware 14.2 package:
a7c745161f5c4e96bc149941893b1a94 tcpdump-4.9.0-i586-1_slack14.2.txz

Slackware x86_64 14.2 package:
e36f1d88a2cd63e2aa1771d589fc53de tcpdump-4.9.0-x86_64-1_slack14.2.txz

Slackware -current package:
c60c97421c742cf02b64535593162f0f n/tcpdump-4.9.0-i586-1.txz

Slackware x86_64 -current package:
22ec2ccd2a28f965d8ce53788d0dfdd4 n/tcpdump-4.9.0-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg tcpdump-4.9.0-i586-1_slack14.2.txz

NOTE: These updates also require the updated libpcap package:

> upgradepkg libpcap-1.8.1-i586-1_slack14.2.txz

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.378 Low

EPSS

Percentile

97.2%