Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2020.3360.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2020:3360-1) |
Summary: | The remote host is missing an update for the 'tcpdump' package(s) announced via the SUSE-SU-2020:3360-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'tcpdump' package(s) announced via the SUSE-SU-2020:3360-1 advisory. Vulnerability Insight: This update for tcpdump fixes the following issues: CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466). The previous update of tcpdump already fixed variuous Buffer overflow/overread vulnerabilities [bsc#1153098, bsc#1153332] CVE-2017-16808 (AoE) CVE-2018-14468 (FrameRelay) CVE-2018-14469 (IKEv1) CVE-2018-14470 (BABEL) CVE-2018-14466 (AFS/RX) CVE-2018-14461 (LDP) CVE-2018-14462 (ICMP) CVE-2018-14465 (RSVP) CVE-2018-14464 (LMP) CVE-2019-15166 (LMP) CVE-2018-14880 (OSPF6) CVE-2018-14882 (RPL) CVE-2018-16227 (802.11) CVE-2018-16229 (DCCP) CVE-2018-14467 (BGP) CVE-2018-14881 (BGP) CVE-2018-16230 (BGP) CVE-2018-16300 (BGP) CVE-2018-14463 (VRRP) CVE-2019-15167 (VRRP) CVE-2018-14879 (tcpdump -V) CVE-2018-16228 (HNCP) is a duplicate of the already fixed CVE-2019-1010220 CVE-2018-16301 (fixed in libpcap) CVE-2018-16451 (SMB) CVE-2018-16452 (SMB) CVE-2018-10103 (SMB - partially fixed, but SMB printing disabled) CVE-2018-10105 (SMB - too unreliably reproduced, SMB printing disabled) Affected Software/OS: 'tcpdump' package(s) on SUSE Linux Enterprise Server 12-SP5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-8037 https://support.apple.com/kb/HT212325 https://support.apple.com/kb/HT212326 https://support.apple.com/kb/HT212327 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2MX34MJIUJQGL6CMEPLTKFOOOC3CJ4Z/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWDBONZVLC6BAOR2KM376DJCM4H3FERV/ http://seclists.org/fulldisclosure/2021/Apr/51 https://github.com/the-tcpdump-group/tcpdump/commit/32027e199368dad9508965aae8cd8de5b6ab5231 https://lists.debian.org/debian-lts-announce/2020/11/msg00018.html |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |