Security update for tcpdump
Announcement ID: | SUSE-SU-2017:2854-1 |
Rating: | moderate |
References: | #1047873 #1057247 |
Affected Products: |
An update that fixes 90 vulnerabilities is now available.
Description:
This update for tcpdump to version 4.9.2 fixes several issues.
These security issues were fixed:
- CVE-2017-11108: Prevent remote attackers to cause DoS (heap-based buffer
over-read and application crash) via crafted packet data. The crash
occured in the EXTRACT_16BITS function, called from the stp_print
function for the Spanning Tree Protocol (bsc#1047873, bsc#1057247).
- CVE-2017-11543: Prevent buffer overflow in the sliplink_print function
in print-sl.c that allowed remote DoS (bsc#1057247).
- CVE-2017-13011: Prevent buffer overflow in bittok2str_internal() that
allowed remote DoS (bsc#1057247)
- CVE-2017-12989: Prevent infinite loop in the RESP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12990: Prevent infinite loop in the ISAKMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12995: Prevent infinite loop in the DNS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12997: Prevent infinite loop in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-11541: Prevent heap-based buffer over-read in the lldp_print
function in print-lldp.c, related to util-print.c that allowed remote
DoS (bsc#1057247).
- CVE-2017-11542: Prevent heap-based buffer over-read in the pimv1_print
function in print-pim.c that allowed remote DoS (bsc#1057247).
- CVE-2017-12893: Prevent buffer over-read in the SMB/CIFS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12894: Prevent buffer over-read in several protocol parsers
that allowed remote DoS (bsc#1057247)
- CVE-2017-12895: Prevent buffer over-read in the ICMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12896: Prevent buffer over-read in the ISAKMP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12897: Prevent buffer over-read in the ISO CLNS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12898: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12899: Prevent buffer over-read in the DECnet parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12900: Prevent buffer over-read in the in several protocol
parsers that allowed remote DoS (bsc#1057247)
- CVE-2017-12901: Prevent buffer over-read in the EIGRP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12902: Prevent buffer over-read in the Zephyr parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12985: Prevent buffer over-read in the IPv6 parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12986: Prevent buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247)
- CVE-2017-12987: Prevent buffer over-read in the 802.11 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12988: Prevent buffer over-read in the telnet parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12991: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12992: Prevent buffer over-read in the RIPng parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12993: Prevent buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-12994: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-12996: Prevent buffer over-read in the PIMv2 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12998: Prevent buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-12999: Prevent buffer over-read in the IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13000: Prevent buffer over-read in the IEEE 802.15.4 parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13001: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13002: Prevent buffer over-read in the AODV parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13003: Prevent buffer over-read in the LMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13004: Prevent buffer over-read in the Juniper protocols parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13005: Prevent buffer over-read in the NFS parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13006: Prevent buffer over-read in the L2TP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13007: Prevent buffer over-read in the Apple PKTAP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13008: Prevent buffer over-read in the IEEE 802.11 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13009: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13010: Prevent buffer over-read in the BEEP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13012: Prevent buffer over-read in the ICMP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13013: Prevent buffer over-read in the ARP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13014: Prevent buffer over-read in the White Board protocol
parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13015: Prevent buffer over-read in the EAP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13016: Prevent buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13017: Prevent buffer over-read in the DHCPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13018: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13019: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13020: Prevent buffer over-read in the VTP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13021: Prevent buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13022: Prevent buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13023: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13024: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13025: Prevent buffer over-read in the IPv6 mobility parser
that allowed remote DoS (bsc#1057247)
- CVE-2017-13026: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13027: Prevent buffer over-read in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13028: Prevent buffer over-read in the BOOTP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13029: Prevent buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13030: Prevent buffer over-read in the PIM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13031: Prevent buffer over-read in the IPv6 fragmentation
header parser that allowed remote DoS (bsc#1057247)
- CVE-2017-13032: Prevent buffer over-read in the RADIUS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13033: Prevent buffer over-read in the VTP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13034: Prevent buffer over-read in the PGM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13035: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13036: Prevent buffer over-read in the OSPFv3 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13037: Prevent buffer over-read in the IP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13038: Prevent buffer over-read in the PPP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13039: Prevent buffer over-read in the ISAKMP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13040: Prevent buffer over-read in the MPTCP parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13041: Prevent buffer over-read in the ICMPv6 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13042: Prevent buffer over-read in the HNCP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13043: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13044: Prevent buffer over-read in the HNCP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13045: Prevent buffer over-read in the VQP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13046: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13047: Prevent buffer over-read in the ISO ES-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13048: Prevent buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13049: Prevent buffer over-read in the Rx protocol parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13050: Prevent buffer over-read in the RPKI-Router parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13051: Prevent buffer over-read in the RSVP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13052: Prevent buffer over-read in the CFM parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13053: Prevent buffer over-read in the BGP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13054: Prevent buffer over-read in the LLDP parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13055: Prevent buffer over-read in the ISO IS-IS parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13687: Prevent buffer over-read in the Cisco HDLC parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13688: Prevent buffer over-read in the OLSR parser that allowed
remote DoS (bsc#1057247)
- CVE-2017-13689: Prevent buffer over-read in the IKEv1 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13690: Prevent buffer over-read in the IKEv2 parser that
allowed remote DoS (bsc#1057247)
- CVE-2017-13725: Prevent buffer over-read in the IPv6 routing header
parser that allowed remote DoS (bsc#1057247)
- Prevent segmentation fault in ESP decoder with OpenSSL 1.1 (bsc#1057247)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:
zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1776=1
- SUSE Linux Enterprise Server 12-SP3:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-1776=1
- SUSE Linux Enterprise Server 12-SP2:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1776=1
- SUSE Linux Enterprise Desktop 12-SP3:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-1776=1
- SUSE Linux Enterprise Desktop 12-SP2:
zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1776=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):
- tcpdump-4.9.2-14.5.1
- tcpdump-debuginfo-4.9.2-14.5.1
- tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):
- tcpdump-4.9.2-14.5.1
- tcpdump-debuginfo-4.9.2-14.5.1
- tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):
- tcpdump-4.9.2-14.5.1
- tcpdump-debuginfo-4.9.2-14.5.1
- tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Desktop 12-SP3 (x86_64):
- tcpdump-4.9.2-14.5.1
- tcpdump-debuginfo-4.9.2-14.5.1
- tcpdump-debugsource-4.9.2-14.5.1
- SUSE Linux Enterprise Desktop 12-SP2 (x86_64):
- tcpdump-4.9.2-14.5.1
- tcpdump-debuginfo-4.9.2-14.5.1
- tcpdump-debugsource-4.9.2-14.5.1
References:
- https://www.suse.com/security/cve/CVE-2017-11108.html
- https://www.suse.com/security/cve/CVE-2017-11541.html
- https://www.suse.com/security/cve/CVE-2017-11542.html
- https://www.suse.com/security/cve/CVE-2017-11543.html
- https://www.suse.com/security/cve/CVE-2017-12893.html
- https://www.suse.com/security/cve/CVE-2017-12894.html
- https://www.suse.com/security/cve/CVE-2017-12895.html
- https://www.suse.com/security/cve/CVE-2017-12896.html
- https://www.suse.com/security/cve/CVE-2017-12897.html
- https://www.suse.com/security/cve/CVE-2017-12898.html
- https://www.suse.com/security/cve/CVE-2017-12899.html
- https://www.suse.com/security/cve/CVE-2017-12900.html
- https://www.suse.com/security/cve/CVE-2017-12901.html
- https://www.suse.com/security/cve/CVE-2017-12902.html
- https://www.suse.com/security/cve/CVE-2017-12985.html
- https://www.suse.com/security/cve/CVE-2017-12986.html
- https://www.suse.com/security/cve/CVE-2017-12987.html
- https://www.suse.com/security/cve/CVE-2017-12988.html
- https://www.suse.com/security/cve/CVE-2017-12989.html
- https://www.suse.com/security/cve/CVE-2017-12990.html
- https://www.suse.com/security/cve/CVE-2017-12991.html
- https://www.suse.com/security/cve/CVE-2017-12992.html
- https://www.suse.com/security/cve/CVE-2017-12993.html
- https://www.suse.com/security/cve/CVE-2017-12994.html
- https://www.suse.com/security/cve/CVE-2017-12995.html
- https://www.suse.com/security/cve/CVE-2017-12996.html
- https://www.suse.com/security/cve/CVE-2017-12997.html
- https://www.suse.com/security/cve/CVE-2017-12998.html
- https://www.suse.com/security/cve/CVE-2017-12999.html
- https://www.suse.com/security/cve/CVE-2017-13000.html
- https://www.suse.com/security/cve/CVE-2017-13001.html
- https://www.suse.com/security/cve/CVE-2017-13002.html
- https://www.suse.com/security/cve/CVE-2017-13003.html
- https://www.suse.com/security/cve/CVE-2017-13004.html
- https://www.suse.com/security/cve/CVE-2017-13005.html
- https://www.suse.com/security/cve/CVE-2017-13006.html
- https://www.suse.com/security/cve/CVE-2017-13007.html
- https://www.suse.com/security/cve/CVE-2017-13008.html
- https://www.suse.com/security/cve/CVE-2017-13009.html
- https://www.suse.com/security/cve/CVE-2017-13010.html
- https://www.suse.com/security/cve/CVE-2017-13011.html
- https://www.suse.com/security/cve/CVE-2017-13012.html
- https://www.suse.com/security/cve/CVE-2017-13013.html
- https://www.suse.com/security/cve/CVE-2017-13014.html
- https://www.suse.com/security/cve/CVE-2017-13015.html
- https://www.suse.com/security/cve/CVE-2017-13016.html
- https://www.suse.com/security/cve/CVE-2017-13017.html
- https://www.suse.com/security/cve/CVE-2017-13018.html
- https://www.suse.com/security/cve/CVE-2017-13019.html
- https://www.suse.com/security/cve/CVE-2017-13020.html
- https://www.suse.com/security/cve/CVE-2017-13021.html
- https://www.suse.com/security/cve/CVE-2017-13022.html
- https://www.suse.com/security/cve/CVE-2017-13023.html
- https://www.suse.com/security/cve/CVE-2017-13024.html
- https://www.suse.com/security/cve/CVE-2017-13025.html
- https://www.suse.com/security/cve/CVE-2017-13026.html
- https://www.suse.com/security/cve/CVE-2017-13027.html
- https://www.suse.com/security/cve/CVE-2017-13028.html
- https://www.suse.com/security/cve/CVE-2017-13029.html
- https://www.suse.com/security/cve/CVE-2017-13030.html
- https://www.suse.com/security/cve/CVE-2017-13031.html
- https://www.suse.com/security/cve/CVE-2017-13032.html
- https://www.suse.com/security/cve/CVE-2017-13033.html
- https://www.suse.com/security/cve/CVE-2017-13034.html
- https://www.suse.com/security/cve/CVE-2017-13035.html
- https://www.suse.com/security/cve/CVE-2017-13036.html
- https://www.suse.com/security/cve/CVE-2017-13037.html
- https://www.suse.com/security/cve/CVE-2017-13038.html
- https://www.suse.com/security/cve/CVE-2017-13039.html
- https://www.suse.com/security/cve/CVE-2017-13040.html
- https://www.suse.com/security/cve/CVE-2017-13041.html
- https://www.suse.com/security/cve/CVE-2017-13042.html
- https://www.suse.com/security/cve/CVE-2017-13043.html
- https://www.suse.com/security/cve/CVE-2017-13044.html
- https://www.suse.com/security/cve/CVE-2017-13045.html
- https://www.suse.com/security/cve/CVE-2017-13046.html
- https://www.suse.com/security/cve/CVE-2017-13047.html
- https://www.suse.com/security/cve/CVE-2017-13048.html
- https://www.suse.com/security/cve/CVE-2017-13049.html
- https://www.suse.com/security/cve/CVE-2017-13050.html
- https://www.suse.com/security/cve/CVE-2017-13051.html
- https://www.suse.com/security/cve/CVE-2017-13052.html
- https://www.suse.com/security/cve/CVE-2017-13053.html
- https://www.suse.com/security/cve/CVE-2017-13054.html
- https://www.suse.com/security/cve/CVE-2017-13055.html
- https://www.suse.com/security/cve/CVE-2017-13687.html
- https://www.suse.com/security/cve/CVE-2017-13688.html
- https://www.suse.com/security/cve/CVE-2017-13689.html
- https://www.suse.com/security/cve/CVE-2017-13690.html
- https://www.suse.com/security/cve/CVE-2017-13725.html
- https://bugzilla.suse.com/1047873
- https://bugzilla.suse.com/1057247