---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Ubuntu update for tcpdump SECUNIA ADVISORY ID: SA24423 VERIFY ADVISORY: http://secunia.com/advisories/24423/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 6.10 http://secunia.com/product/12470/ Ubuntu Linux 6.06 http://secunia.com/product/10611/ Ubuntu Linux 5.10 http://secunia.com/product/6606/ DESCRIPTION: Ubuntu has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA24318 SOLUTION: Apply updated packages. -- Ubuntu 5.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1.diff.gz Size/MD5: 12037 9086124de1072e521624979a49a41749 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1.dsc Size/MD5: 672 aa2dbeff2bbc288a8d98bff3d0743d10 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1.orig.tar.gz Size/MD5: 662060 5f589a34be42d335176d1b8cfcbd1f6b amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1_amd64.deb Size/MD5: 307150 324c0c4ae58717e2e0af4c3e251c72c9 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1_i386.deb Size/MD5: 284880 05fcf0bd9f44a884cce9576f64593614 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1_powerpc.deb Size/MD5: 294816 561ba6b77837204cd6cc9e088b77fccd sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.1-1ubuntu1.1_sparc.deb Size/MD5: 299920 d759b94205402352adb055af34a70ebd -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1.diff.gz Size/MD5: 10786 a46a8c2116b0e280127b0f4ca7f85c2b http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1.dsc Size/MD5: 685 21536cc080bd4dc72fdb0635349e29cc http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4.orig.tar.gz Size/MD5: 716862 4b64755bbc8ba1af49c747271a6df5b8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1_amd64.deb Size/MD5: 312992 92e764c3084d0e9ed236afa956755fef i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1_i386.deb Size/MD5: 289554 83a973219fcc4cb4edb27cb1c820666b powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1_powerpc.deb Size/MD5: 301108 e810b1f74b8e8722cc81aa7bcf0ca64c sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-2ubuntu0.1_sparc.deb Size/MD5: 304888 59349548d64f1b8bb8b79018754bdf0d -- Ubuntu 6.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1.diff.gz Size/MD5: 10919 0fbd287a08757cfa3a9c52f12d8147e3 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1.dsc Size/MD5: 632 283ba6bae274162eb64aa8039ebd4062 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4.orig.tar.gz Size/MD5: 716862 4b64755bbc8ba1af49c747271a6df5b8 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1_amd64.deb Size/MD5: 314924 5aa45e116446876b771524b6631ab3a8 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1_i386.deb Size/MD5: 300618 de0caa6ea55db70547fa1cec2fd0056e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1_powerpc.deb Size/MD5: 303532 1c5dd389b720a339df581dd277d63d84 sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.9.4-4ubuntu0.1_sparc.deb Size/MD5: 308412 9c27ed7d8f42e0790902a985e687e5e1 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-429-1 OTHER REFERENCES: SA24318: http://secunia.com/advisories/24318/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------