The BGP decoding routines for tcpdump used incorrect bounds checking when
copying data. This could be abused by introducing malicious traffic on a sniffed
network for a denial of service attack against tcpdump, or possibly even remote
RHSA-2002:094 patched CAN-2002-0380 with tcpdump-3.6.2-11
AS/RHSA-2002:121 patched CAN-2002-0380 with tcpdump-3.6.2-11
3.6.* is vulnerable, 3.7 isn't
CVE applied for Dec11: CAN-2002-1350
*** Bug 80152 has been marked as a duplicate of this bug. ***
An errata has been issued which should help the problem described in this bug report.
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen
this bug report if the solution does not work for you.
This hasn't been fixed in anything but the Advanced Series. It should be reopened.
This bug is filed against the Advanced Server product and therefore should be
closed. There might be a bug already open against the base product for this
security issue, but even if not an errata is in progress for the base.