The BGP decoding routines for tcpdump used incorrect bounds checking when copying data. This could be abused by introducing malicious traffic on a sniffed network for a denial of service attack against tcpdump, or possibly even remote code execution. RHSA-2002:094 patched CAN-2002-0380 with tcpdump-3.6.2-11 AS/RHSA-2002:121 patched CAN-2002-0380 with tcpdump-3.6.2-11 See http://marc.theaimsgroup.com/?l=bugtraq&m=103956164004031&w=2 also http://www.tcpdump.org/lists/workers/2001/10/msg00101.html 3.6.* is vulnerable, 3.7 isn't CVE applied for Dec11: CAN-2002-1350
*** Bug 80152 has been marked as a duplicate of this bug. ***
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2003-033.html
This hasn't been fixed in anything but the Advanced Series. It should be reopened.
This bug is filed against the Advanced Server product and therefore should be closed. There might be a bug already open against the base product for this security issue, but even if not an errata is in progress for the base.