[CVE-2007-3798] Remote integer overflow vulnerabilty in print-bgp.c

Related Vulnerabilities: CVE-2007-3798   cve-2007-3798  

Debian Bug report logs - #434030
[CVE-2007-3798] Remote integer overflow vulnerabilty in print-bgp.c

version graph

Reported by: Daniel Leidert <daniel.leidert@wgdd.de>

Date: Sat, 21 Jul 2007 01:48:02 UTC

Severity: important

Tags: patch, security

Found in version tcpdump/3.9.5-2

Fixed in version tcpdump/3.9.5-3

Done: Romain Francoise <rfrancoise@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Romain Francoise <rfrancoise@debian.org>:
Bug#434030; Package tcpdump. (full text, mbox, link).


Acknowledgement sent to Daniel Leidert <daniel.leidert@wgdd.de>:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Romain Francoise <rfrancoise@debian.org>. (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Daniel Leidert <daniel.leidert@wgdd.de>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: [CVE-2007-3798] Remote integer overflow vulnerabilty in print-bgp.c
Date: Sat, 21 Jul 2007 03:45:13 +0200
Package: tcpdump
Version: 3.9.5-2
Severity: important
Tags: security patch

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Seems there is a vulnerability in print-bgp.c. There is an explloit
available at http://www.digit-labs.org/files/exploits/tcpdump-bgp.c. A
patch is available too:
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12.
Please check yourself.

Regards, Daniel


- -- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (850, 'unstable'), (700, 'testing'), (550, 'stable'), (110, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.21.5 (PREEMPT)
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages tcpdump depends on:
ii  libc6                         2.6-2      GNU C Library: Shared libraries
ii  libpcap0.8                    0.9.5-1    System interface for user-level pa
ii  libssl0.9.8                   0.9.8e-5   SSL shared libraries

tcpdump recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGoWUpm0bx+wiPa4wRAvJOAJ9sqc9omFvk98FmLtdZyvpq4eNh+ACfXR7k
W5APXC88dEUlhabRF4oz0HA=
=Gl/S
-----END PGP SIGNATURE-----



Information forwarded to debian-bugs-dist@lists.debian.org:
Bug#434030; Package tcpdump. (full text, mbox, link).


Acknowledgement sent to Romain Francoise <rfrancoise@debian.org>:
Extra info received and forwarded to list. (full text, mbox, link).


Message #10 received at 434030@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: Daniel Leidert <daniel.leidert@wgdd.de>
Cc: 434030@bugs.debian.org
Subject: Re: Bug#434030: [CVE-2007-3798] Remote integer overflow vulnerabilty in print-bgp.c
Date: Wed, 25 Jul 2007 18:42:54 +0200
Thanks, I'll take care of this during the week-end, or early next
week.

-- 
  ,''`.
 : :' :        Romain Francoise <rfrancoise@debian.org>
 `. `'         http://people.debian.org/~rfrancoise/
   `-



Reply sent to Romain Francoise <rfrancoise@debian.org>:
You have taken responsibility. (full text, mbox, link).


Notification sent to Daniel Leidert <daniel.leidert@wgdd.de>:
Bug acknowledged by developer. (full text, mbox, link).


Message #15 received at 434030-close@bugs.debian.org (full text, mbox, reply):

From: Romain Francoise <rfrancoise@debian.org>
To: 434030-close@bugs.debian.org
Subject: Bug#434030: fixed in tcpdump 3.9.5-3
Date: Wed, 01 Aug 2007 18:17:04 +0000
Source: tcpdump
Source-Version: 3.9.5-3

We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive:

tcpdump_3.9.5-3.diff.gz
  to pool/main/t/tcpdump/tcpdump_3.9.5-3.diff.gz
tcpdump_3.9.5-3.dsc
  to pool/main/t/tcpdump/tcpdump_3.9.5-3.dsc
tcpdump_3.9.5-3_amd64.deb
  to pool/main/t/tcpdump/tcpdump_3.9.5-3_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 434030@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Romain Francoise <rfrancoise@debian.org> (supplier of updated tcpdump package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 01 Aug 2007 19:56:04 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source amd64
Version: 3.9.5-3
Distribution: unstable
Urgency: medium
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Description: 
 tcpdump    - A powerful tool for network monitoring and data acquisition
Closes: 434030
Changes: 
 tcpdump (3.9.5-3) unstable; urgency=medium
 .
   * Convert to quilt for patch management:
     + debian/control: Build-Depend on quilt (>= 0.40) instead of dpatch.
     + debian/rules: Include /usr/share/quilt/quilt.make.
     + Convert all dpatch patches to regular patches.
 .
   * debian/patches/41_cve-2007-3798.diff: New patch, fixes an integer
     overflow in the BGP dissector (CVE-2007-3798), thanks to Daniel Leidert
     (closes: #434030).
   * debian/patches/series: Update.
Files: 
 676d4777f8bb5f976633b1884655c8e9 623 net optional tcpdump_3.9.5-3.dsc
 3b9189bc4c88d07fa47c38806dfd4dcf 11327 net optional tcpdump_3.9.5-3.diff.gz
 bdbfaa2293f42aa439832bddb162c73a 315998 net optional tcpdump_3.9.5-3_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGsMutogN2vsA8Vt8RAo2eAKCA35oqSJ53N0oCJfFWsAkqjfPmEQCdEYH1
nGK/coGwOXdqPxirjFe1cSQ=
=9mz6
-----END PGP SIGNATURE-----




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Wed, 05 Sep 2007 07:28:08 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:03:49 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.