Debian Bug report logs -
#434030
[CVE-2007-3798] Remote integer overflow vulnerabilty in print-bgp.c
Reported by: Daniel Leidert <daniel.leidert@wgdd.de>
Date: Sat, 21 Jul 2007 01:48:02 UTC
Severity: important
Tags: patch, security
Found in version tcpdump/3.9.5-2
Fixed in version tcpdump/3.9.5-3
Done: Romain Francoise <rfrancoise@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Debian Security Team <team@security.debian.org>, Romain Francoise <rfrancoise@debian.org>
:
Bug#434030
; Package tcpdump
.
(full text, mbox, link).
Acknowledgement sent to Daniel Leidert <daniel.leidert@wgdd.de>
:
New Bug report received and forwarded. Copy sent to Debian Security Team <team@security.debian.org>, Romain Francoise <rfrancoise@debian.org>
.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: tcpdump
Version: 3.9.5-2
Severity: important
Tags: security patch
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Seems there is a vulnerability in print-bgp.c. There is an explloit
available at http://www.digit-labs.org/files/exploits/tcpdump-bgp.c. A
patch is available too:
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12.
Please check yourself.
Regards, Daniel
- -- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (850, 'unstable'), (700, 'testing'), (550, 'stable'), (110, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.21.5 (PREEMPT)
Locale: LANG=de_DE, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash
Versions of packages tcpdump depends on:
ii libc6 2.6-2 GNU C Library: Shared libraries
ii libpcap0.8 0.9.5-1 System interface for user-level pa
ii libssl0.9.8 0.9.8e-5 SSL shared libraries
tcpdump recommends no packages.
- -- no debconf information
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGoWUpm0bx+wiPa4wRAvJOAJ9sqc9omFvk98FmLtdZyvpq4eNh+ACfXR7k
W5APXC88dEUlhabRF4oz0HA=
=Gl/S
-----END PGP SIGNATURE-----
Information forwarded to debian-bugs-dist@lists.debian.org
:
Bug#434030
; Package tcpdump
.
(full text, mbox, link).
Acknowledgement sent to Romain Francoise <rfrancoise@debian.org>
:
Extra info received and forwarded to list.
(full text, mbox, link).
Message #10 received at 434030@bugs.debian.org (full text, mbox, reply):
Thanks, I'll take care of this during the week-end, or early next
week.
--
,''`.
: :' : Romain Francoise <rfrancoise@debian.org>
`. `' http://people.debian.org/~rfrancoise/
`-
Reply sent to Romain Francoise <rfrancoise@debian.org>
:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Daniel Leidert <daniel.leidert@wgdd.de>
:
Bug acknowledged by developer.
(full text, mbox, link).
Message #15 received at 434030-close@bugs.debian.org (full text, mbox, reply):
Source: tcpdump
Source-Version: 3.9.5-3
We believe that the bug you reported is fixed in the latest version of
tcpdump, which is due to be installed in the Debian FTP archive:
tcpdump_3.9.5-3.diff.gz
to pool/main/t/tcpdump/tcpdump_3.9.5-3.diff.gz
tcpdump_3.9.5-3.dsc
to pool/main/t/tcpdump/tcpdump_3.9.5-3.dsc
tcpdump_3.9.5-3_amd64.deb
to pool/main/t/tcpdump/tcpdump_3.9.5-3_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 434030@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Romain Francoise <rfrancoise@debian.org> (supplier of updated tcpdump package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 01 Aug 2007 19:56:04 +0200
Source: tcpdump
Binary: tcpdump
Architecture: source amd64
Version: 3.9.5-3
Distribution: unstable
Urgency: medium
Maintainer: Romain Francoise <rfrancoise@debian.org>
Changed-By: Romain Francoise <rfrancoise@debian.org>
Description:
tcpdump - A powerful tool for network monitoring and data acquisition
Closes: 434030
Changes:
tcpdump (3.9.5-3) unstable; urgency=medium
.
* Convert to quilt for patch management:
+ debian/control: Build-Depend on quilt (>= 0.40) instead of dpatch.
+ debian/rules: Include /usr/share/quilt/quilt.make.
+ Convert all dpatch patches to regular patches.
.
* debian/patches/41_cve-2007-3798.diff: New patch, fixes an integer
overflow in the BGP dissector (CVE-2007-3798), thanks to Daniel Leidert
(closes: #434030).
* debian/patches/series: Update.
Files:
676d4777f8bb5f976633b1884655c8e9 623 net optional tcpdump_3.9.5-3.dsc
3b9189bc4c88d07fa47c38806dfd4dcf 11327 net optional tcpdump_3.9.5-3.diff.gz
bdbfaa2293f42aa439832bddb162c73a 315998 net optional tcpdump_3.9.5-3_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGsMutogN2vsA8Vt8RAo2eAKCA35oqSJ53N0oCJfFWsAkqjfPmEQCdEYH1
nGK/coGwOXdqPxirjFe1cSQ=
=9mz6
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org
.
(Wed, 05 Sep 2007 07:28:08 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Wed Jun 19 13:03:49 2019;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.