Update for tcpdump fixes DoS vulnerability
A bug in the network analysis tool tcpdump can cause the application to crash when processing specific WLAN-802.11 frames. The bug is based on a buffer overflow in the parse_elements function. Because the tcpdump library forms the basis of many applications, an attacker could, for example, exploit the vulnerability to disable a WLAN-IDS in order to be able to carry out further attacks undisturbed. The bug was found in version 3.9.5 - previous versions are probably also affected. A patch on the CVS fixes the problem.
- tcpdump: off-by-one heap overflow in 802.11 printer, bug report by Moritz Jodeit
- CVS log for tcpdump/print-802_11.c, description of the update at tcpdump.org
(ehe)