TITLE: Debian update for tcpdump SECUNIA ADVISORY ID: SA17101 VERIFY ADVISORY: http://secunia.com/advisories/17101/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Debian GNU/Linux unstable alias sid http://secunia.com/product/530/ Debian GNU/Linux 3.1 http://secunia.com/product/5307/ Debian GNU/Linux 3.0 http://secunia.com/product/143/ DESCRIPTION: Debian has issued an update for tcpdump. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA15125 SOLUTION: Apply updated packages. -- Debian GNU/Linux 3.0 alias woody -- Source archives: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9.dsc Size/MD5 checksum: 587 fac8be69ffc0fc9e98f720df652c3b8b http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9.diff.gz Size/MD5 checksum: 14189 09abe4d2c22c16aad175edf0e2d1e4a2 http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2.orig.tar.gz Size/MD5 checksum: 380635 6bc8da35f9eed4e675bfdf04ce312248 Alpha architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_alpha.deb Size/MD5 checksum: 214820 9c3c9a0fb94f149144f4379c0f9b4071 ARM architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_arm.deb Size/MD5 checksum: 180762 bad61479d23cad44448f7fb91a9d6355 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_i386.deb Size/MD5 checksum: 170594 4f94b2909aed2bc2a308cf08d2d16208 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_ia64.deb Size/MD5 checksum: 253760 9c75cf903731d747f95a90b25f0a5de1 HP Precision architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_hppa.deb Size/MD5 checksum: 196882 61d38516880cae6a195120d09e866430 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_m68k.deb Size/MD5 checksum: 158494 a87ff72914ae89e87ad510993c162c8b Big endian MIPS architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_mips.deb Size/MD5 checksum: 189980 11df907857746a04ca58a8a71ff53242 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_mipsel.deb Size/MD5 checksum: 194374 6d8cf0ee59fc4da2b09dfde3cc1d74e8 PowerPC architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_powerpc.deb Size/MD5 checksum: 178012 3ad9b8f3a9df2732329ad98e3c156018 IBM S/390 architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_s390.deb Size/MD5 checksum: 175390 892a544d87e3de60b2888b77442334da Sun Sparc architecture: http://security.debian.org/pool/updates/main/t/tcpdump/tcpdump_3.6.2-2.9_sparc.deb Size/MD5 checksum: 180826 0931640053a722312cd48ed47b2fbafd -- Debian GNU/Linux 3.1 alias sarge -- Fixed in version 3.8.3-4. -- Debian GNU/Linux unstable alias sid -- Fixed in version 3.8.3-4. ORIGINAL ADVISORY: http://www.debian.org/security/2005/dsa-850 OTHER REFERENCES: SA15125: http://secunia.com/advisories/15125/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------