From owner-doc-jp@jp.freebsd.org  Wed Nov  1 06:25:53 2000
Received: (from daemon@localhost)
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) id GAA99592;
	Wed, 1 Nov 2000 06:25:53 +0900 (JST)
	(envelope-from owner-doc-jp@jp.FreeBSD.org)
Received: from eos.ocn.ne.jp (eos.ocn.ne.jp [210.190.142.171])
	by castle.jp.freebsd.org (8.9.3+3.2W/8.7.3) with ESMTP id GAA99586
	for <doc-jp@jp.freebsd.org>; Wed, 1 Nov 2000 06:25:52 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
Received: from mail.hrslab.yi.org (p0189-ip01funabasi.chiba.ocn.ne.jp [211.123.225.189])
	by eos.ocn.ne.jp (8.9.1a/OCN/) with ESMTP id GAA12783
	for <doc-jp@jp.freebsd.org>; Wed, 1 Nov 2000 06:26:53 +0900 (JST)
Message-Id: <200010312126.GAA12783@eos.ocn.ne.jp>
Received: from localhost (alph.hrslab.yi.org [192.168.0.10])
	by mail.hrslab.yi.org (8.9.3/3.7W/DomainMaster) with ESMTP id GAA91221
	for <doc-jp@jp.freebsd.org>; Wed, 1 Nov 2000 06:10:29 +0900 (JST)
	(envelope-from hrs@eos.ocn.ne.jp)
To: doc-jp@jp.freebsd.org
In-Reply-To: <20001030231311.7642A37B680@hub.freebsd.org>
References: <20001030231311.7642A37B680@hub.freebsd.org>
X-Mailer: Mew version 1.94.1 on Emacs 19.34 / Mule 2.3 (SUETSUMUHANA)
Mime-Version: 1.0
Content-Type: Multipart/Mixed;
 boundary="--Next_Part(Wed_Nov__1_06:09:57_2000_179)--"
Content-Transfer-Encoding: 7bit
Date: Wed, 01 Nov 2000 06:10:28 +0900
From: Hiroki Sato <hrs@eos.ocn.ne.jp>
X-Dispatcher: imput version 20000228(IM140)
Lines: 184
Reply-To: doc-jp@jp.freebsd.org
Precedence: list
X-Distribute: distribute version 2.1 (Alpha) patchlevel 24e+000315
X-Sequence: doc-jp 7775
Subject: [doc-jp 7775] Re: ANNOUNCE: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump
Errors-To: owner-doc-jp@jp.freebsd.org
Sender: owner-doc-jp@jp.freebsd.org
X-Originator: hrs@eos.ocn.ne.jp

----Next_Part(Wed_Nov__1_06:09:57_2000_179)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Transfer-Encoding: 7bit

$B:4F#!wEl5~M}2JBg3X$G$9!#(B

 00:61 $B$NK]Lu$G$9!#(B

----Next_Part(Wed_Nov__1_06:09:57_2000_179)--
Content-Type: Text/Plain; charset=iso-2022-jp
Content-Disposition: attachment; filename="00:61"
Content-Transfer-Encoding: 7bit

 $B$3$N%a!<%k$O(B, announce-jp $B$KN.$l$?(B

  Subject: ANNOUNCE: FreeBSD Security Advisory: FreeBSD-SA-00:61.tcpdump
  From: FreeBSD Security Advisories <security-advisories@freebsd.org>
  Date: Mon, 30 Oct 2000 15:13:11 -0800 (PST)
  Message-Id: <20001030231311.7642A37B680@hub.freebsd.org>
  X-Sequence: announce-jp 579

 $B$rF|K\8lLu$7$?$b$N$G$9(B. 

 $B$3$N4+9p$NCf$G>R2p$5$l$F$$$k(B WWW $B%5%$%H(B http://www.FreeBSD.org/ $B$*$h$S(B
 FTP $B%5%$%H(B ftp://ftp.FreeBSD.org/ $B$K$O(B, $BF|K\$N%_%i!<%5%$%H$,B8:_$7$^$9(B.
 $B%_%i!<%5%$%H$rMxMQ$9$k$K$O(B,
 http://www.FreeBSD.org/ $B$r(B http://www.jp.FreeBSD.org/www.freebsd.org/ $B$K(B,
 ftp://ftp.FreeBSD.org/ $B$r(B ftp://ftp.jp.FreeBSD.org/ $B$K(B,
 $B$=$l$>$lCV$-49$($F$/$@$5$$(B.

 $B%M%C%H%o!<%/$N:.;($r4KOB$9$k$?$a(B, $B$^$:$O%_%i!<%5%$%H$NMxMQ$r(B
 $B9MN8$9$k$h$&$*4j$$$7$^$9(B.  $B%_%i!<%5%$%H$K4X$9$k>\:Y$O(B

  http://www.FreeBSD.org/handbook/mirror.html ($B1QJ8(B)
  http://www.FreeBSD.org/ja/handbook/mirror.html ($BF|K\8lLu(B)

 $B$K(B, $B$^$?(B, $B2a5n$NF|K\8lHG%;%-%e%j%F%#4+9p$O(B

  http://www.FreeBSD.org/ja/security/

 $B$K$^$H$a$i$l$F$$$^$9(B.

 $B86J8$O(B PGP $B=pL>$5$l$F$$$^$9$,(B, $B$3$NF|K\8lLu$O(B PGP $B=pL>$5$l$F$$$^$;$s(B. 
 $B%Q%C%AEy$NFbMF$,2~cb$5$l$F$$$J$$$3$H$r3NG'$9$k$?$a$K(B PGP $B$N%A%'%C%/$r(B
 $B9T$J$&$K$O(B, $B86J8$r;2>H$7$F$/$@$5$$(B. 

 $BF|K\8lLu$O(B FreeBSD $BF|K\8l%I%-%e%a%s%F!<%7%g%s%W%m%8%'%/%H(B (doc-jp) $B$,;29M$N(B
 $B$?$a$KDs6!$9$k$b$N$G(B, doc-jp $B$O(B $B$=$NFbMF$K$D$$$F$$$+$J$kJ]>Z$b$$$?$7$^$;$s(B.
 $BF|K\8lLu$K$D$$$F$N$*Ld$$9g$o$;$O(B doc-jp@jp.FreeBSD.org $B$^$G$*4j$$$7$^$9(B.

--($B$3$3$+$i(B)

=============================================================================
FreeBSD-SA-00:61                                           Security Advisory
                                                                FreeBSD, Inc.

$B%H%T%C%/(B:	tcpdump contains remote vulnerabilities

$BJ,N`(B:		core
$B%b%8%e!<%k(B:	tcpdump
$B9pCNF|(B:		2000-10-31
$B%/%l%8%C%H(B:	$BFbIt%;%-%e%j%F%#4F::Cf$KH/8+(B
$B1F6AHO0O(B:	FreeBSD 4.2 $B$h$jA0$N$9$Y$F$N(B FreeBSD 3.x, 4.x $B%j%j!<%9(B
                $B=$@5F|0JA0$N(B FreeBSD 3.5.1-STABLE $B$*$h$S(B 4.1.1-STABLE
$B=$@5F|(B:		2000-10-04 (FreeBSD 4.1.1-STABLE)
		2000-10-05 (FreeBSD 3.5.1-STABLE)
$B%Y%s%@$NBP1~(B:	$B=$@5%Q%C%A$,8x3+:Q$_(B
FreeBSD $B$K8GM-$+(B:	NO

I.   $BGX7J(B - Background

tcpdump is a tool for monitoring network activity.
tcpdump $B$O%M%C%H%o!<%/$N2TF/>uBV$r%b%K%?%j%s%0$9$k%D!<%k$G$9(B.

II.  $BLdBj$N>\:Y(B - Problem Description

Several overflowable buffers were discovered in the version of tcpdump
included in FreeBSD, during internal source code auditing.  Some
simply allow the remote attacker to crash the local tcpdump process,
but there is a more serious vulnerability in the decoding of AFS ACL
packets in the more recent version of tcpdump (tcpdump 3.5) included
in FreeBSD 4.0-RELEASE, 4.1-RELEASE and 4.1.1-RELEASE, which may allow
a remote attacker to execute arbitrary code on the local system
(usually root, since root privileges are required to run tcpdump).

$BFbIt%;%-%e%j%F%#4F::$N:](B, FreeBSD $B$K4^$^$l$k(B tcpdump $B$NCf$K(B
$B%P%C%U%!%*!<%P%U%m!<$N4m81@-$r;}$D%P%C%U%!$,H/8+$5$l$^$7$?(B.
$B$=$N$&$A$N$$$/$D$+$O(B, $B%j%b!<%H$N967b<T$,%m!<%+%k$N(B tcpdump $B%W%m%;%9$r(B
$B%/%i%C%7%e$5$;$k$N$KMxMQ2DG=$J$b$N$G$9(B.  $B$^$?(B, FreeBSD 4.0-RELEASE,
4.1-RELEASE $B$*$h$S(B 4.1.1-RELEASE $B$K4^$^$l$F$$$k?7$7$$%P!<%8%g%s$N(B
tcpdump (tcpdump 3.5) $B$K$O(B, AFS ACL $B%Q%1%C%H$N%G%3!<%IItJ,$K(B
$B%j%b!<%H$N967b<T$,%m!<%+%k%7%9%F%`$GG$0U$N%3!<%I$r<B9T(B (tcpdump $B$O(B
root $B8"8B$rMW5a$9$k$?$a(B, $BDL>o$O(B root $B8"8B$G(B) $B$G$-$k$h$&$J(B,
$B$h$j?<9o$J<eE@$,B8:_$7$^$9(B.

The former issue may be a problem for systems using tcpdump as a form
of intrusion detection system, i.e. to monitor suspicious network
activity: after the attacker crashes any listening tcpdump processes
their subsequent activities will not be observed.

$B0l$DL\$NLdBjE@$O(B, tcpdump $B$r;H$C$F?/F~8!CN%7%9%F%`(B (intrusion detection
system) $B$r9=C[$7$F$$$k>l9g$KLdBj$H$J$j$^$9(B.  $B$?$H$($P(B
$B%M%C%H%o!<%/$N2x$7$$5sF0$r%b%K%?%j%s%0$7$F$$$k>l9g(B, $B967b<T$,2TF/Cf$N(B
tcpdump $B%W%m%;%9$r%/%i%C%7%e$5$;$k$H(B, $B$=$N8e$N%M%C%H%o!<%/>uBV$,(B
$B4Q;!$G$-$J$/$J$C$F$7$^$$$^$9(B.

All released versions of FreeBSD prior to the correction date
including 3.5.1-RELEASE, 4.0-RELEASE, 4.1-RELEASE and 4.1.1-RELEASE
are vulnerable to the "remote crash" problems, and FreeBSD
4.0-RELEASE, 4.1-RELEASE and 4.1.1-RELEASE are also vulnerable to the
"remote execution" vulnerability.  Both problems were corrected in
4.1.1-STABLE prior to the release of FreeBSD 4.2-RELEASE.

FreeBSD 3.5.1-RELEASE, 4.0-RELEASE, 4.1-RELEASE $B$*$h$S(B 4.1.1-RELEASE $B$r4^$`(B,
$B=$@5F|0JA0$N$9$Y$F$N(B FreeBSD $B%j%j!<%9$K$O!V%j%b!<%H$+$i$N%/%i%C%7%e967b!W$K(B
$BBP$9$k<eE@$,(B, FreeBSD 4.0-RELEASE, 4.1-RELEASE $B$*$h$S(B 4.1.1-RELEASE $B$K$O(B
$B$5$i$K!V%j%b!<%H$+$iG$0U$N%3!<%I$,<B9T$G$-$k!W<eE@$,B8:_$7$^$9(B.
$BLdBjE@$ON>J}$H$b(B, 4.2-RELEASE $B$N%j%j!<%9A0$N(B 4.1.1-STABLE $B$G=$@5$5$l$F$$$^$9(B.

III. $B1F6AHO0O(B - Impact

Remote users can cause the local tcpdump process to crash, and (under
FreeBSD 4.0-RELEASE, 4.1-RELEASE, 4.1.1-RELEASE and 4.1.1-STABLE prior
to the correction date) may be able to cause arbitrary code to be
executed as the user running tcpdump, usually root.

$B%j%b!<%H%f!<%6$O%m!<%+%k$N(B tcpdump $B%W%m%;%9$r%/%i%C%7%e$5$;$k$3$H$,$G$-(B,
($B=$@5F|0JA0$N(B FreeBSD 4.0-RELEASE, 4.1-RELEASE, 4.1.1-RELEASE $B$*$h$S(B
4.1.1-STABLE $B$G$O(B) tcpdump $B$r<B9T$7$F$$$k%f!<%6(B ($BDL>o$O(B root) $B$N8"8B$G(B
$BG$0U$N%3!<%I$r<B9T$G$-$k2DG=@-$,$"$j$^$9(B.

IV.  $B2sHrJ}K!(B - Workaround

Do not use vulnerable versions of tcpdump in network environments
which may contain packets from untrusted sources.

$B<eE@$r;}$C$?%P!<%8%g%s$N(B tcpdump $B$r(B, $B?.Mj$G$-$J$$Aw?.85$+$i$N(B
$B%Q%1%C%H$,4^$^$l$k2DG=@-$N$"$k%M%C%H%o!<%/4D6-$G;HMQ$7$J$$$G$/$@$5$$(B.

V.   $B2r7h:v(B - Solution

One of the following:
$B<!$N$$$:$l$+$K=>$C$F$/$@$5$$(B.

1) Upgrade your vulnerable FreeBSD system to 4.1.1-STABLE or
3.5.1-STABLE after the respective correction dates.
1) $B<eE@$r;}$C$?(B FreeBSD $B%7%9%F%`$r(B, $B$=$l$>$l$N=$@5F|0J9_$N(B
   4.1.1-STABLE $B$b$7$/$O(B 3.5.1-STABLE $B$K%"%C%W%0%l!<%I$7$^$9(B.

2a) FreeBSD 3.x systems prior to the correction date
2a) $B=$@5F|0JA0$N(B FreeBSD 3.x $B%7%9%F%`$N>l9g(B

Download the patch and the detached PGP signature from the following
locations, and verify the signature using your PGP utility.
$B=$@5%Q%C%A$H(B PGP $B=pL>$r0J2<$N>l=j$+$i%@%&%s%m!<%I$7(B,
PGP $B%f!<%F%#%j%F%#$r;H$C$F=pL>$r3NG'$7$F$/$@$5$$(B.

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:61/tcpdump-3.x.patch
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:61/tcpdump-3.x.patch.asc

# cd /usr/src/contrib/tcpdump
# patch -p < /path/to/patch
# cd /usr/src/usr.sbin/tcpdump
# make depend && make all install

2b) FreeBSD 4.x systems prior to the correction date
2b) $B=$@5F|0JA0$N(B FreeBSD 4.x $B%7%9%F%`$N>l9g(B

Download the patch and the detached PGP signature from the following
locations, and verify the signature using your PGP utility.
$B=$@5%Q%C%A$H(B PGP $B=pL>$r0J2<$N>l=j$+$i%@%&%s%m!<%I$7(B,
PGP $B%f!<%F%#%j%F%#$r;H$C$F=pL>$r3NG'$7$F$/$@$5$$(B.

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:61/tcpdump-4.x.patch
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/patches/SA-00:61/tcpdump-4.x.patch.asc

# cd /usr/src/contrib/tcpdump
# patch -p < /path/to/patch
# cd /usr/src/usr.sbin/tcpdump
# make depend && make all install

$hrs: FreeBSD-SA/00:61,v 1.1 2000/10/31 21:00:53 hrs Exp $

----Next_Part(Wed_Nov__1_06:09:57_2000_179)----
