SUSE-SU-2015:0679-1

Source
https://www.suse.com/support/update/announcement/2015/suse-su-20150679-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2015:0679-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2015:0679-1
Related
Published
2015-03-20T14:25:34Z
Modified
2015-03-20T14:25:34Z
Summary
Security update for tcpdump
Details

tcpdump was updated to fix five vulnerabilities in protocol printers

When running tcpdump, a remote unauthenticated user could have crashed the application or, potentially, execute arbitrary code by injecting crafted packages into the network.

The following vulnerabilities were fixed: * IPv6 mobility printer remote DoS (CVE-2015-0261, bnc#922220) * PPP printer remote DoS (CVE-2014-9140, bnc#923142) * force printer remote DoS (CVE-2015-2155, bnc#922223) * ethernet printer remote DoS (CVE-2015-2154, bnc#922222) * tcp printer remote DoS (CVE-2015-2153, bnc#922221)

References

Affected packages

SUSE:Linux Enterprise Desktop 12 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Desktop%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-7.1

Ecosystem specific

{
    "binaries": [
        {
            "tcpdump": "4.5.1-7.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-7.1

Ecosystem specific

{
    "binaries": [
        {
            "tcpdump": "4.5.1-7.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 / tcpdump

Package

Name
tcpdump
Purl
pkg:rpm/suse/tcpdump&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.5.1-7.1

Ecosystem specific

{
    "binaries": [
        {
            "tcpdump": "4.5.1-7.1"
        }
    ]
}