USN-141-1: tcpdump vulnerability
21 June 2005
tcpdump vulnerability
Releases
Details
It was discovered that certain invalid BGP packets triggered an
infinite loop in tcpdump, which caused tcpdump to stop working. This
could be abused by a remote attacker to bypass tcpdump analysis of
network traffic.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
tcpdump
-
Ubuntu 4.10
-
tcpdump
-
In general, a standard system update will make all the necessary changes.