[Full-Disclosure] [RHSA-2003:174-01] Updated tcpdump packages fix privilege dropping error

From: bugzillaat_private
Date: Thu May 15 2003 - 01:03:58 PDT

  • Next message: Frog Man: "[VulnWatch] OneOrZero Security Problems (PHP)"

    ---------------------------------------------------------------------
                       Red Hat Security Advisory
    
    Synopsis:          Updated tcpdump packages fix privilege dropping error
    Advisory ID:       RHSA-2003:174-01
    Issue date:        2003-05-15
    Updated on:        2003-05-15
    Product:           Red Hat Linux
    Keywords:          tcpdump
    Cross references:  
    Obsoletes:         RHSA-2003:032-
    CVE Names:         CAN-2003-0194
    ---------------------------------------------------------------------
    
    1. Topic:
    
    Updated tcpdump packages that correctly drop privileges on startup are now
    available.
    
    2. Relevant releases/architectures:
    
    Red Hat Linux 7.1 - i386
    Red Hat Linux 7.2 - i386, ia64
    Red Hat Linux 7.3 - i386
    Red Hat Linux 8.0 - i386
    Red Hat Linux 9 - i386
    
    3. Problem description:
    
    Tcpdump is a command-line tool for monitoring network traffic. 
    
    The Red Hat tcpdump packages advertise that by default tcpdump will drop
    permissions to user 'pcap'.  Due to a compilation error this did not
    happen, and tcpdump would run as root unless the '-U' flag was specified.
    
    Users of tcpdump are advised to upgrade to these errata packages, which
    contain are compiled so that by default tcpdump will drop privileges to the
    'pcap' user.
    
    4. Solution:
    
    Before applying this update, make sure all previously released errata
    relevant to your system have been applied.
    
    Please note that this update is available via Red Hat Network.  To use Red
    Hat Network, launch the Red Hat Update Agent with the following command:
    
    up2date
    
    This will start an interactive process that will result in the appropriate
    RPMs being upgraded on your system.
    
    5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
    
    88881 - CAN-2003-0145 RADUIS tcpdump vulnerability
    90208 - CAN-2003-0194 tcpdump didn't drop root to pcap user like promised
    
    6. RPMs required:
    
    Red Hat Linux 7.1:
    
    SRPMS:
    ftp://updates.redhat.com/7.1/en/os/SRPMS/tcpdump-3.6.3-17.7.1.3.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.1/en/os/i386/tcpdump-3.6.3-17.7.1.3.i386.rpm
    
    Red Hat Linux 7.2:
    
    SRPMS:
    ftp://updates.redhat.com/7.2/en/os/SRPMS/tcpdump-3.6.3-17.7.2.3.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.2/en/os/i386/tcpdump-3.6.3-17.7.2.3.i386.rpm
    
    ia64:
    ftp://updates.redhat.com/7.2/en/os/ia64/tcpdump-3.6.3-17.7.2.3.ia64.rpm
    
    Red Hat Linux 7.3:
    
    SRPMS:
    ftp://updates.redhat.com/7.3/en/os/SRPMS/tcpdump-3.6.3-17.7.3.3.src.rpm
    
    i386:
    ftp://updates.redhat.com/7.3/en/os/i386/tcpdump-3.6.3-17.7.3.3.i386.rpm
    
    Red Hat Linux 8.0:
    
    SRPMS:
    ftp://updates.redhat.com/8.0/en/os/SRPMS/tcpdump-3.6.3-17.8.0.3.src.rpm
    
    i386:
    ftp://updates.redhat.com/8.0/en/os/i386/tcpdump-3.6.3-17.8.0.3.i386.rpm
    
    Red Hat Linux 9:
    
    SRPMS:
    ftp://updates.redhat.com/9/en/os/SRPMS/tcpdump-3.7.2-1.9.1.src.rpm
    
    i386:
    ftp://updates.redhat.com/9/en/os/i386/tcpdump-3.7.2-1.9.1.i386.rpm
    
    
    
    7. Verification:
    
    MD5 sum                          Package Name
    --------------------------------------------------------------------------
    fac820eb58d79fc58d30bff1fd11f33d 7.1/en/os/SRPMS/tcpdump-3.6.3-17.7.1.3.src.rpm
    3eadddac8cdf6ae0b14e8016f651e1f0 7.1/en/os/i386/tcpdump-3.6.3-17.7.1.3.i386.rpm
    5f5c14bd0dfdaa5b0d5dbc0fb70da395 7.2/en/os/SRPMS/tcpdump-3.6.3-17.7.2.3.src.rpm
    c48e86db37c7f767ec8931ebb54fc0ae 7.2/en/os/i386/tcpdump-3.6.3-17.7.2.3.i386.rpm
    39da71bfef8520c979db8cf21c4f6781 7.2/en/os/ia64/tcpdump-3.6.3-17.7.2.3.ia64.rpm
    f9de6824ac351207bd105978eefed89d 7.3/en/os/SRPMS/tcpdump-3.6.3-17.7.3.3.src.rpm
    8d54631bf99d61090f0752f29ef51f8f 7.3/en/os/i386/tcpdump-3.6.3-17.7.3.3.i386.rpm
    67a36a50ec50a8aa2d32b2462fae653d 8.0/en/os/SRPMS/tcpdump-3.6.3-17.8.0.3.src.rpm
    afba9bea894090b9c179979403347629 8.0/en/os/i386/tcpdump-3.6.3-17.8.0.3.i386.rpm
    1b1b577c9ebfe84f735a6498140e1e7f 9/en/os/SRPMS/tcpdump-3.7.2-1.9.1.src.rpm
    6cff8bf6b2425c361eec70ba3017d82b 9/en/os/i386/tcpdump-3.7.2-1.9.1.i386.rpm
    
    
    These packages are GPG signed by Red Hat for security.  Our key is
    available at http://www.redhat.com/solutions/security/news/publickey/
    
    You can verify each package with the following command:
        
        rpm --checksig -v <filename>
    
    If you only wish to verify that each package has not been corrupted or
    tampered with, examine only the md5sum with the following command:
        
        md5sum <filename>
    
    
    8. References:
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0194
    
    9. Contact:
    
    The Red Hat security contact is <securityat_private>.  More contact
    details at http://www.redhat.com/solutions/security/news/contact/
    
    Copyright 2003 Red Hat, Inc.
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Thu May 15 2003 - 01:43:58 PDT