---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_vacancies/ Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/ ---------------------------------------------------------------------- TITLE: Mandriva update for tcpdump SECUNIA ADVISORY ID: SA24451 VERIFY ADVISORY: http://secunia.com/advisories/24451/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for tcpdump. This fixes a vulnerability, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA24318 SOLUTION: Apply updated packages. Mandriva Linux 2006 d92b272b29238545670818ca1d03b171 2006.0/i586/tcpdump-3.9.3-1.3.20060mdk.i586.rpm 66d13291c325f4c08725ee28fd57c21d 2006.0/SRPMS/tcpdump-3.9.3-1.3.20060mdk.src.rpm Mandriva Linux 2006/X86_64 9a66f32f4fd622c3986a80dd447bad10 2006.0/x86_64/tcpdump-3.9.3-1.3.20060mdk.x86_64.rpm 66d13291c325f4c08725ee28fd57c21d 2006.0/SRPMS/tcpdump-3.9.3-1.3.20060mdk.src.rpm Mandriva Linux 2007 34629bcb6e9ee83b6e9163bd0e3ab889 2007.0/i586/tcpdump-3.9.4-1.1mdv2007.0.i586.rpm ba39819805f0935af53e2ec77b302d14 2007.0/SRPMS/tcpdump-3.9.4-1.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 e0c4b35447b06600387db895f2ecee54 2007.0/x86_64/tcpdump-3.9.4-1.1mdv2007.0.x86_64.rpm ba39819805f0935af53e2ec77b302d14 2007.0/SRPMS/tcpdump-3.9.4-1.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2007:056 OTHER REFERENCES: SA24318: http://secunia.com/advisories/24318/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------