---------------------------------------------------------------------- Want a new IT Security job? Vacant positions at Secunia: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Ubuntu update for tcpdump SECUNIA ADVISORY ID: SA15174 VERIFY ADVISORY: http://secunia.com/advisories/15174/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 4.10 http://secunia.com/product/4491/ Ubuntu Linux 5.04 http://secunia.com/product/5036/ DESCRIPTION: Ubuntu has issued an update for tcpdump. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA15125 SOLUTION: Apply updated packages. -- Ubuntu 4.10 (Warty Warthog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.1.diff.gz Size/MD5: 10585 6c4901ccc742597d67e32ce32e2f3a5c http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.1.dsc Size/MD5: 672 ec71731f2e8f8fcaeb441468b8fd0a8e http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3.orig.tar.gz Size/MD5: 567116 30645001f4b97019677cad88d3811904 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.1_amd64.deb Size/MD5: 255638 babb2cd9f5b5fc5d37dc745cb2aeaee6 i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.1_i386.deb Size/MD5: 234566 0103496ba2f39329ece8d95dc8f6e4d1 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.1_powerpc.deb Size/MD5: 245482 4bb41525b737a837172f48e99beb5f3d -- Ubuntu 5.04 (Hoary Hedgehog) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.2.diff.gz Size/MD5: 10623 f1ca38c73c38e02d92a7aa8514e9e0e7 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.2.dsc Size/MD5: 672 109d4aff0a4e7f770bad49e2af5cd7b0 http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3.orig.tar.gz Size/MD5: 567116 30645001f4b97019677cad88d3811904 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.2_amd64.deb Size/MD5: 255614 bb885bb99cddaa7d2681e03d3506bd0e i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.2_i386.deb Size/MD5: 234534 88ee0436e9eac9c1fb5b5ffcae2d8e75 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/t/tcpdump/tcpdump_3.8.3-3ubuntu0.2_powerpc.deb Size/MD5: 245540 c5d94ffc34bf3dd1af3725a709b850e5 ORIGINAL ADVISORY: http://www.ubuntulinux.org/support/documentation/usn/usn-119-1 OTHER REFERENCES: SA15125: http://secunia.com/advisories/15125/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------