CVE-2017-11543

Related Vulnerabilities: CVE-2017-11543   CVE-2017-11541   CVE-2017-11542  

Debian Bug report logs - #873806
CVE-2017-11543

version graph

Reported by: Guido Günther <agx@sigxcpu.org>

Date: Thu, 31 Aug 2017 10:42:11 UTC

Severity: important

Tags: security, upstream

Found in version tcpdump/4.9.0-1

Fixed in versions tcpdump/4.9.1-3, tcpdump/4.9.2-1~deb9u1, tcpdump/4.9.2-1~deb8u1

Done: Romain Francoise <rfrancoise@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Romain Francoise <rfrancoise@debian.org>:
Bug#873806; Package tcpdump. (Thu, 31 Aug 2017 10:42:14 GMT) (full text, mbox, link).


Acknowledgement sent to Guido Günther <agx@sigxcpu.org>:
New Bug report received and forwarded. Copy sent to team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Romain Francoise <rfrancoise@debian.org>. (Thu, 31 Aug 2017 10:42:14 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Guido Günther <agx@sigxcpu.org>
To: submit@bugs.debian.org
Subject: CVE-2017-11543
Date: Thu, 31 Aug 2017 12:41:06 +0200
Package: tcpdump
X-Debbugs-CC: team@security.debian.org secure-testing-team@lists.alioth.debian.org
Severity: important
Tags: security

Hi,

the following vulnerability was published for tcpdump.

CVE-2017-11541[0]:
| tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print
| function in print-lldp.c, related to util-print.c.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-11541
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11541

Please adjust the affected versions in the BTS as needed.

Note that I've not been able to reproduce the vulnerability with the
pcap file provided at

    https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl

but given this has a CVE I figured it's safer to bring this to your
attention anyway.



Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 31 Aug 2017 11:15:12 GMT) (full text, mbox, link).


Marked as found in versions tcpdump/4.9.0-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Thu, 31 Aug 2017 11:15:13 GMT) (full text, mbox, link).


Reply sent to Romain Francoise <rfrancoise@debian.org>:
You have taken responsibility. (Mon, 04 Sep 2017 18:27:14 GMT) (full text, mbox, link).


Notification sent to Guido Günther <agx@sigxcpu.org>:
Bug acknowledged by developer. (Mon, 04 Sep 2017 18:27:14 GMT) (full text, mbox, link).


Message #14 received at 873806-close@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: 873806-close@bugs.debian.org
Subject: Bug#873806: fixed in tcpdump 4.9.1-3
Date: Mon, 04 Sep 2017 18:23:02 +0000
Source: tcpdump
Source-Version: 4.9.1-3

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873806@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <rfrancoise@debian.org> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 04 Sep 2017 19:45:45 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source
Version: 4.9.1-3
Distribution: unstable
Urgency: high
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Description:
 tcpdump    - command-line network traffic analyzer
Closes: 873804 873805 873806
Changes:
 tcpdump (4.9.1-3) unstable; urgency=high
 .
   * Cherry-pick three upstream commits to fix the following:
     + CVE-2017-11541: buffer over-read in safeputs() (closes: #873804)
     + CVE-2017-11542: buffer over-read in pimv1_print() (closes: #873805)
     + CVE-2017-11543: buffer overflow in sliplink_print() (closes: #873806)
   * Urgency high due to security fixes.
Checksums-Sha1:
 d7efac898d514d8240d9044d573be5ad04206886 2182 tcpdump_4.9.1-3.dsc
 4507deca7823f93c8c8bc4994557156b220a2e8a 16208 tcpdump_4.9.1-3.debian.tar.xz
 0f23ae4e6708735a48564b876ebce39f9ff370fe 5229 tcpdump_4.9.1-3_source.buildinfo
Checksums-Sha256:
 230668ace3ae470e2c9fbd15abe299331621edaf1549c4c416783d8aeccaef00 2182 tcpdump_4.9.1-3.dsc
 ba185ef50e0314d779f4f94267543c961a92a5cd8418954e17908d2182f17633 16208 tcpdump_4.9.1-3.debian.tar.xz
 8c963e57e37015a0c75fe466d1caecb3372fccdb03375fc2ac27717d59c976e4 5229 tcpdump_4.9.1-3_source.buildinfo
Files:
 c45ed5fe41bf9832caeed10cdcb0008e 2182 net optional tcpdump_4.9.1-3.dsc
 3e00bdf8265683741983c85fc413acb9 16208 net optional tcpdump_4.9.1-3.debian.tar.xz
 c74963091004bd9eb5b00f2c7f0334d4 5229 net optional tcpdump_4.9.1-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=6ge5
-----END PGP SIGNATURE-----




Reply sent to Romain Francoise <rfrancoise@debian.org>:
You have taken responsibility. (Sat, 23 Sep 2017 10:06:16 GMT) (full text, mbox, link).


Notification sent to Guido Günther <agx@sigxcpu.org>:
Bug acknowledged by developer. (Sat, 23 Sep 2017 10:06:16 GMT) (full text, mbox, link).


Message #19 received at 873806-close@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: 873806-close@bugs.debian.org
Subject: Bug#873806: fixed in tcpdump 4.9.2-1~deb9u1
Date: Sat, 23 Sep 2017 10:03:35 +0000
Source: tcpdump
Source-Version: 4.9.2-1~deb9u1

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873806@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <rfrancoise@debian.org> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 09 Sep 2017 20:33:48 +0200
Source: tcpdump
Binary: tcpdump
Architecture: amd64 source
Version: 4.9.2-1~deb9u1
Distribution: stretch-security
Urgency: high
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Closes: 867718 873804 873805 873806
Description: 
 tcpdump    - command-line network traffic analyzer
Changes:
 tcpdump (4.9.2-1~deb9u1) stretch-security; urgency=high
 .
   * New upstream release, fixing 90 new CVEs. See the upstream changelog
     for the full list (closes: #867718, #873804, #873805, #873806).
Checksums-Sha1: 
 184e2da682ff3031440bc15a57d7d793835790ca 1953 tcpdump_4.9.2-1~deb9u1.dsc
 f7dccebe94c3d07ac8744d43297ea2b98b35a13f 2298386 tcpdump_4.9.2.orig.tar.gz
 2f2cbaff068f220c33306bd9612928a14a9cafd9 12464 tcpdump_4.9.2-1~deb9u1.debian.tar.xz
 242c59d65f5d2d6ad8f858d8bdf3c87f9788e487 5227 tcpdump_4.9.2-1~deb9u1_source.buildinfo
 ce0d5ff191ef78d54edd7a4484479cf65fc6725d 880512 tcpdump-dbgsym_4.9.2-1~deb9u1_amd64.deb
 e8e95e1f90e072f79541ad82bdf9ea4bfa0420f0 4815 tcpdump_4.9.2-1~deb9u1_amd64.buildinfo
 79a47754723b3a548aff192cea9ad8d440276d85 414652 tcpdump_4.9.2-1~deb9u1_amd64.deb
Checksums-Sha256: 
 e11b0b9ba1ebc10c5ed21e13f372ffb08cd2502d404b680f1e6989c155c64e05 1953 tcpdump_4.9.2-1~deb9u1.dsc
 798b3536a29832ce0cbb07fafb1ce5097c95e308a6f592d14052e1ef1505fe79 2298386 tcpdump_4.9.2.orig.tar.gz
 96a5bdd93c7a30b328bc2096723b64eb0eb440a3b096052db624b4d4ac0c937d 12464 tcpdump_4.9.2-1~deb9u1.debian.tar.xz
 9fdd1d71136ecb377873df7e504735fdd29d04fe78d8c5cb7c93078ddac585cc 5227 tcpdump_4.9.2-1~deb9u1_source.buildinfo
 fe8a42e3861317a4baa1dd5ef475c3d6440b7c1d4f72d1e7f73700ced9b17048 880512 tcpdump-dbgsym_4.9.2-1~deb9u1_amd64.deb
 8e2639b080429c8dd7168e76e8a667380af560efa25335a6ba9ce97a1b0aceb1 4815 tcpdump_4.9.2-1~deb9u1_amd64.buildinfo
 94541bfca7de7bdd3ec51f0ae5b3b92b1e9aaa90ec83e3645520ef23c8c710fa 414652 tcpdump_4.9.2-1~deb9u1_amd64.deb
Files: 
 67875543ce43caa4db110b4430400cd7 1953 net optional tcpdump_4.9.2-1~deb9u1.dsc
 9bbc1ee33dab61302411b02dd0515576 2298386 net optional tcpdump_4.9.2.orig.tar.gz
 6a5d675c6c9debb2ca1cc678b55303d8 12464 net optional tcpdump_4.9.2-1~deb9u1.debian.tar.xz
 8a15410d22a255da2a2a59a84ad34dfb 5227 net optional tcpdump_4.9.2-1~deb9u1_source.buildinfo
 cb78b163a3ddb2570fd317c86a9dc14d 880512 debug extra tcpdump-dbgsym_4.9.2-1~deb9u1_amd64.deb
 2fe0abaeb5f680b9095c3e1a64516264 4815 net optional tcpdump_4.9.2-1~deb9u1_amd64.buildinfo
 c876351c2d46812d30eec389a07c27c1 414652 net optional tcpdump_4.9.2-1~deb9u1_amd64.deb

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEvjSXQsqYfs1+d+QtrRX0NfBfli0FAlm4HUIACgkQrRX0NfBf
li1eOw//UDtMFd5P2GMrEtHLMdcwRF+sgv9PYT8D/sNIJNZYjOoSLQE5iL2rGklu
HZ8NNVE2/yUDqIPIB2pOyCekJx41O85g32vdcnvvkbUxSvGFplW0QlSkly6IBvs1
vE1Qh4HxASDj/Nn4n/nEHhBe6e/HehHdS1NuaeRQ7+xmanDBpokk9RJ1KGAf/Xry
CdtMr5EPvpH244EbKgcCzBPwC1Dh9MmXE/S8ZJ7cUnCcx/v2u6CHkeqDq+KZK53H
HKsB5efK6g75Y+8L94kUW/R/mv5QNEsysICBPK8usXwP5cybs4RN1JFO3NDpI4vi
BiFbFJk0unioA5Lrwo60ZJQwdqNd/Y/8D5C1qCtKzIZgII1Inig8o1QBElvT6OCt
vDgpvzAApetN7nDDRYjCq4uzTYqsZ5AN+G1q2rNjG2XIR2eFilnX6bXpL/oswBh0
J3/XmIV+H5094Y/zVK5R1JMEn0PshE8F1cwWSlftyRWh4L/4BEUvLV9+vA/o8lpa
Pyu0uhOr3HurQ6eNjLeBSejv4vNZDfshZ47VL+qyxFwB4gmB6mEYRz2ky4GiuOC9
HS7a6nDPWNA2DQlc7qfmPfi34b0gQxvSlMLyJLNziL/Fv9IkcmfroVFHfiDM0UqF
sqpEkVTJYQzMEGE8qact6CLIMtpEnZu4OqKTxJFy5v2jtpRTgrM=
=s+Xb
-----END PGP SIGNATURE-----




Reply sent to Romain Francoise <rfrancoise@debian.org>:
You have taken responsibility. (Sat, 23 Sep 2017 20:06:13 GMT) (full text, mbox, link).


Notification sent to Guido Günther <agx@sigxcpu.org>:
Bug acknowledged by developer. (Sat, 23 Sep 2017 20:06:13 GMT) (full text, mbox, link).


Message #24 received at 873806-close@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: 873806-close@bugs.debian.org
Subject: Bug#873806: fixed in tcpdump 4.9.2-1~deb8u1
Date: Sat, 23 Sep 2017 20:02:47 +0000
Source: tcpdump
Source-Version: 4.9.2-1~deb8u1

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 873806@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <rfrancoise@debian.org> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 09 Sep 2017 21:39:47 +0200
Source: tcpdump
Binary: tcpdump
Architecture: amd64 source
Version: 4.9.2-1~deb8u1
Distribution: jessie-security
Urgency: high
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Closes: 867718 873804 873805 873806
Description: 
 tcpdump    - command-line network traffic analyzer
Changes:
 tcpdump (4.9.2-1~deb8u1) jessie-security; urgency=high
 .
   * New upstream release, fixing 90 new CVEs. See the upstream changelog
     for the full list (closes: #867718, #873804, #873805, #873806).
Checksums-Sha1: 
 5511b408ac90d1157b4f54a598150c0c92a7a16b 1950 tcpdump_4.9.2-1~deb8u1.dsc
 09569a91048a05d99fd201acb17244dd09227b3a 12832 tcpdump_4.9.2-1~deb8u1.debian.tar.xz
 3fa24d9d0c6f59df0a684ada33e05aad64630ec8 5171 tcpdump_4.9.2-1~deb8u1_source.buildinfo
 bff0a5af307e9aff5e91b3a0b8ae9bbcc4c56a3e 414518 tcpdump_4.9.2-1~deb8u1_amd64.deb
Checksums-Sha256: 
 e39b80bcd6c082f1b72428b9a20a591de48a399db5e6b94438bb2ff02e2f0e97 1950 tcpdump_4.9.2-1~deb8u1.dsc
 4a778f95c28072499b2156d61123b179b7dd606342d675546e6b7cd0eeb5e6d5 12832 tcpdump_4.9.2-1~deb8u1.debian.tar.xz
 c3d5b796b9624f8ca238bdbb50764548980f5eff2ef675669aa6c383c8c93cdd 5171 tcpdump_4.9.2-1~deb8u1_source.buildinfo
 6bcf465812a09a327caf18360685bece7cb183f45dd6ac3d9bc28f16976edf75 414518 tcpdump_4.9.2-1~deb8u1_amd64.deb
Files: 
 6c9fdef5786f8deec27ab1a9fe4c599b 1950 net optional tcpdump_4.9.2-1~deb8u1.dsc
 26efb3f35c818ddb09363db9690c3882 12832 net optional tcpdump_4.9.2-1~deb8u1.debian.tar.xz
 3fc5218e1bf121e2ed4a9adb21b80f0c 5171 net optional tcpdump_4.9.2-1~deb8u1_source.buildinfo
 9b260d56dbd89931d275c539d1a689d1 414518 net optional tcpdump_4.9.2-1~deb8u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=Z8T3
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sun, 22 Oct 2017 07:25:50 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:26:13 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.