FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Buffer overflow in tcpdump(1)

Affected packages
tcpdump < 3.9.6
Affected systems
6.2 < FreeBSD < 6.2_7
6.1 < FreeBSD < 6.1_19
5.5 < FreeBSD < 5.5_15

Details

VuXML ID 2dc764fa-40c0-11dc-aeac-02e0185f8d72
Discovery 2007-08-01
Entry 2007-08-02

Problem Description:

An un-checked return value in the BGP dissector code can result in an integer overflow. This value is used in subsequent buffer management operations, resulting in a stack based buffer overflow under certain circumstances.

Impact:

By crafting malicious BGP packets, an attacker could exploit this vulnerability to execute code or crash the tcpdump process on the target system. This code would be executed in the context of the user running tcpdump(1). It should be noted that tcpdump(1) requires privileges in order to open live network interfaces.

Workaround:

No workaround is available.

References

CVE Name CVE-2007-3798
FreeBSD Advisory SA-07:06.tcpdump