First published: Sat May 17 2003(Updated: )
tcpdump does not properly drop privileges to the pcap user when starting up.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump | =3.4-39 | |
Tcpdump | =3.6.2-9 | |
Tcpdump | =3.6.2-9 | |
Tcpdump | =3.6.2-12 | |
Tcpdump | =3.6.3-3 | |
Tcpdump | =3.7.2-1 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.2 | |
Red Hat Linux | =7.3 | |
Red Hat Linux | =8.0 | |
Red Hat Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2003-0194 is considered moderate due to improper privilege management in tcpdump.
To fix CVE-2003-0194, you should upgrade tcpdump to a version that addresses this privilege escalation vulnerability.
Affected versions of tcpdump include 3.4-39, 3.6.2-9, 3.6.2-12, 3.6.3-3, and 3.7.2-1.
Vulnerable systems include Red Hat Linux versions 7.1, 7.2, 7.3, 8.0, and 9.0 when running affected tcpdump versions.
A temporary workaround for CVE-2003-0194 includes running tcpdump with lower privileges, but upgrading is strongly recommended.