CERTA-2005-AVI-164

Vulnerability from certfr_avis - Published: 2005-05-17 - Updated: 2005-10-10

None

Description

L'application tcpdump est un analyseur réseau.

De nombreuses vulnérabilités découvertes dans différentes fonctions permettent à un utilisateur distant mal intentionné d'effectuer un déni de service en consommant toutes les ressources CPU. L'individu mal intentionné peut exploiter ces vulnérabilités au moyen de paquets GRE, BGP, LDP ou RSVP malicieusement construits.

Solution

Se référer au bulletin de sécurité des éditeurs pour l'obtention des correctifs (cf. section Documentation).

tcpdump 3.x.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003etcpdump 3.x.\u003c/p\u003e",
  "content": "## Description\n\nL\u0027application tcpdump est un analyseur r\u00e9seau.\n\nDe nombreuses vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans diff\u00e9rentes fonctions\npermettent \u00e0 un utilisateur distant mal intentionn\u00e9 d\u0027effectuer un d\u00e9ni\nde service en consommant toutes les ressources CPU. L\u0027individu mal\nintentionn\u00e9 peut exploiter ces vuln\u00e9rabilit\u00e9s au moyen de paquets GRE,\nBGP, LDP ou RSVP malicieusement construits.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 des \u00e9diteurs pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-05-17T00:00:00",
  "last_revision_date": "2005-10-10T00:00:00",
  "links": [
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 2 pour tcpdump du 03    mai 2005 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SR:2005:017 du 13 juillet    2005 :",
      "url": "http://www.novell.com/linux/security/advisories/2005_17_sr.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-850 du 09 octobre 2005 :",
      "url": "http://www.debian.org/security/2005/dsa-850"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:101 du 15 juin    2005 :",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:101"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:421 du 11 mai 2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-421.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2005-137 du 14 juin 2005 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-137_RHSA-2005-417_RHSA-2005-421.pdf"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:505 du 13 juin 2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-505.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200505-06 / tcpdump du 09    mai 2005 (mis \u00e0 jour le 12 juin 2005) :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-06.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:417 du 11 mai 2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-417.html"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Fedora Core 3 pour tcpdump du 03    mai 2005 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-854 du 09 octobre 2005 :",
      "url": "http://www.debian.org/security/2005/dsa-854"
    },
    {
      "title": "Site Internet de l\u0027\u00e9diteur :",
      "url": "http://www.tcpdump.org"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD FreeBSD-SA-05:10 du 09 juin    2005 :",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:10.tcpdump.asc"
    }
  ],
  "reference": "CERTA-2005-AVI-164",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-05-17T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
      "revision_date": "2005-06-10T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Gentoo et RedHat RHSA-2005:505. Ajout de la r\u00e9f\u00e9rence CVE CAN-2005-1267. Modification de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandriva.",
      "revision_date": "2005-06-14T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:101. Correction des r\u00e9f\u00e9rences CVE. Ajout du bulletin de s\u00e9curit\u00e9 Avaya ASA-2005-137.",
      "revision_date": "2005-06-17T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 SUSE.",
      "revision_date": "2005-07-13T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian DSA-850 et DSA-854.",
      "revision_date": "2005-10-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans tcpdump",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005:087",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:087"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:421-04",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:417-05",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…