Bug 250275 (CVE-2007-3798) - CVE-2007-3798 tcpdump BGP integer overflow
Summary: CVE-2007-3798 tcpdump BGP integer overflow
Status: CLOSED ERRATA
Alias: CVE-2007-3798
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: source=gentoo,reported=20070710,publi...
Keywords: Security
Depends On: 250289 250290 250291 250293 250294
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-07-31 16:00 UTC by Josh Bressers
Modified: 2019-06-08 12:21 UTC (History)
1 user (show)

(edit)
Clone Of:
(edit)
Last Closed: 2008-01-15 14:53:53 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2007:0368 normal SHIPPED_LIVE Moderate: tcpdump security and bug fix update 2007-11-07 16:18:24 UTC
Red Hat Product Errata RHSA-2007:0387 normal SHIPPED_LIVE Moderate: tcpdump security and bug fix update 2007-11-15 14:57:32 UTC

Description Josh Bressers 2007-07-31 16:00:18 UTC
An integer overflow flaw was found in tcpdump's BGP protocol dissector.  This
could potentially allow an attacker to execute arbitrary code as the user
running tcpdump.


The upstream patch is here:
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12

The Gentoo bug has more information
http://bugs.gentoo.org/show_bug.cgi?id=184815

Comment 2 Josh Bressers 2007-07-31 17:03:20 UTC
This flaw does not affect the version of tcpdump shipped in Red Hat Enterprise
Linux 2.1 or 3.

Comment 5 Red Hat Product Security 2008-01-15 14:53:53 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2007-0368.html
  http://rhn.redhat.com/errata/RHSA-2007-0387.html

Fedora:
  https://admin.fedoraproject.org/updates/F7/FEDORA-2007-1361




Note You need to log in before you can comment on or make changes to this bug.