CVE-2007-3798

Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=184815 Third Party Advisory
http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12 Broken Link
http://docs.info.apple.com/article.html?artnum=307179 Broken Link
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html Mailing List
http://secunia.com/advisories/26135 Broken Link Vendor Advisory
http://secunia.com/advisories/26168 Broken Link Vendor Advisory
http://secunia.com/advisories/26223 Broken Link Vendor Advisory
http://secunia.com/advisories/26231 Broken Link Vendor Advisory
http://secunia.com/advisories/26263 Broken Link Vendor Advisory
http://secunia.com/advisories/26266 Broken Link Vendor Advisory
http://secunia.com/advisories/26286 Broken Link Vendor Advisory
http://secunia.com/advisories/26395 Broken Link Vendor Advisory
http://secunia.com/advisories/26404 Broken Link Vendor Advisory
http://secunia.com/advisories/26521 Broken Link Vendor Advisory
http://secunia.com/advisories/27580 Broken Link Vendor Advisory
http://secunia.com/advisories/28136 Broken Link Vendor Advisory
http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc Third Party Advisory
http://security.gentoo.org/glsa/glsa-200707-14.xml Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313 Mailing List Patch
http://www.debian.org/security/2007/dsa-1353 Third Party Advisory
http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c Exploit
http://www.mandriva.com/security/advisories?name=MDKSA-2007:148 Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_16_sr.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0368.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0387.html Broken Link Vendor Advisory
http://www.securityfocus.com/archive/1/474225/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/24965 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018434 Broken Link Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0023/ Broken Link
http://www.turbolinux.com/security/2007/TLSA-2007-46.txt Broken Link
http://www.ubuntu.com/usn/usn-492-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA07-352A.html Broken Link Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2007/2578 Broken Link Vendor Advisory
http://www.vupen.com/english/advisories/2007/4238 Broken Link Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:slackware:slackware:9.0:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:9.1:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.0:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.1:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.2:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:11.0:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:12.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p14:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p11:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p13:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p16:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p17:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p18:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

History

12 Jan 2024, 22:06

Type Values Removed Values Added
First Time Freebsd freebsd
Debian
Apple mac Os X Server
Canonical
Apple mac Os X
Freebsd
Debian debian Linux
Slackware
Apple
Slackware slackware
Canonical ubuntu Linux
CWE CWE-189 CWE-252
CVSS v2 : 6.8
v3 : unknown
v2 : 6.8
v3 : 9.8
References () http://bugs.gentoo.org/show_bug.cgi?id=184815 - () http://bugs.gentoo.org/show_bug.cgi?id=184815 - Third Party Advisory
References () http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12 - () http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12 - Broken Link
References () http://docs.info.apple.com/article.html?artnum=307179 - () http://docs.info.apple.com/article.html?artnum=307179 - Broken Link
References () http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html - Mailing List
References () http://secunia.com/advisories/26135 - Vendor Advisory () http://secunia.com/advisories/26135 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26168 - Vendor Advisory () http://secunia.com/advisories/26168 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26223 - Vendor Advisory () http://secunia.com/advisories/26223 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26231 - Vendor Advisory () http://secunia.com/advisories/26231 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26263 - Vendor Advisory () http://secunia.com/advisories/26263 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26266 - Vendor Advisory () http://secunia.com/advisories/26266 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26286 - Vendor Advisory () http://secunia.com/advisories/26286 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26395 - Vendor Advisory () http://secunia.com/advisories/26395 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26404 - Vendor Advisory () http://secunia.com/advisories/26404 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/26521 - Vendor Advisory () http://secunia.com/advisories/26521 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/27580 - Vendor Advisory () http://secunia.com/advisories/27580 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/28136 - Vendor Advisory () http://secunia.com/advisories/28136 - Broken Link, Vendor Advisory
References () http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc - () http://security.freebsd.org/advisories/FreeBSD-SA-07:06.tcpdump.asc - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200707-14.xml - () http://security.gentoo.org/glsa/glsa-200707-14.xml - Third Party Advisory
References () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313 - () http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.449313 - Mailing List, Patch
References () http://www.debian.org/security/2007/dsa-1353 - () http://www.debian.org/security/2007/dsa-1353 - Third Party Advisory
References () http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c - () http://www.digit-labs.org/files/exploits/private/tcpdump-bgp.c - Exploit
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:148 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:148 - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2007_16_sr.html - () http://www.novell.com/linux/security/advisories/2007_16_sr.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2007-0368.html - () http://www.redhat.com/support/errata/RHSA-2007-0368.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2007-0387.html - Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2007-0387.html - Broken Link, Vendor Advisory
References () http://www.securityfocus.com/archive/1/474225/100/0/threaded - () http://www.securityfocus.com/archive/1/474225/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/24965 - () http://www.securityfocus.com/bid/24965 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018434 - () http://www.securitytracker.com/id?1018434 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.trustix.org/errata/2007/0023/ - () http://www.trustix.org/errata/2007/0023/ - Broken Link
References () http://www.turbolinux.com/security/2007/TLSA-2007-46.txt - () http://www.turbolinux.com/security/2007/TLSA-2007-46.txt - Broken Link
References () http://www.ubuntu.com/usn/usn-492-1 - () http://www.ubuntu.com/usn/usn-492-1 - Third Party Advisory
References () http://www.us-cert.gov/cas/techalerts/TA07-352A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-352A.html - Broken Link, Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2007/2578 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/2578 - Broken Link, Vendor Advisory
References () http://www.vupen.com/english/advisories/2007/4238 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/4238 - Broken Link, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9771 - Broken Link
CPE cpe:2.3:o:freebsd:freebsd:5.5:-:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:12.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p14:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p8:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p11:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p13:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p1:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p11:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:9.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p3:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p16:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:9.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p13:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.2:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p2:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p6:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p17:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p5:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p9:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p18:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p9:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p2:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p1:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:10.0:*:*:*:*:*:*:*
cpe:2.3:a:slackware:slackware:11.0:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:5.5:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p10:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p12:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.1:p7:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:-:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p4:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.2:p1:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*

Information

Published : 2007-07-16 22:30

Updated : 2024-01-12 22:06


NVD link : CVE-2007-3798

Mitre link : CVE-2007-3798

CVE.ORG link : CVE-2007-3798


JSON object : View

Products Affected

debian

  • debian_linux

apple

  • mac_os_x
  • mac_os_x_server

freebsd

  • freebsd

tcpdump

  • tcpdump

slackware

  • slackware

canonical

  • ubuntu_linux
CWE
CWE-252

Unchecked Return Value