
{"id":225,"date":"2007-07-22T20:12:56","date_gmt":"2007-07-22T23:12:56","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=225"},"modified":"2007-07-22T20:43:11","modified_gmt":"2007-07-22T23:43:11","slug":"ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/","title":{"rendered":"Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump"},"content":{"rendered":"<p>Se ha encontrado una vulnerabilidad en la herramienta tcpdump que puede<br \/>\nser potencialmente aprovechada por un atacante para ejecutar c\u00c3\u00b3digo<br \/>\narbitrario si la v\u00c3\u00adctima procesa tr\u00c3\u00a1fico manipulado.<\/p>\n<p>Tcpdump, es un programa que coloca la tarjeta de red en modalidad<br \/>\npromiscua y captura los paquetes que circulan por la red. Se trata de<br \/>\nuna herramienta muy vers\u00c3\u00a1til, especialmente utilizada en tareas de<br \/>\nseguridad inform\u00c3\u00a1tica (por ejemplo, en la evaluaci\u00c3\u00b3n de la seguridad de<br \/>\nuna red) as\u00c3\u00ad como en el an\u00c3\u00a1lisis del funcionamiento de las redes.<\/p>\n<p>El fallo se debe a un uso incorrecto el valor de retorno snprinf en la<br \/>\nfunci\u00c3\u00b3n decode_labeled_vpn_l2() dentro del c\u00c3\u00b3digo de print-bgp.c. Esto<br \/>\npuede provocar un desbordamiento de memoria intermedia si se env\u00c3\u00adan<br \/>\npaquetes BGP especialmente manipulados y son tratados con esta<br \/>\nherramienta. Eso podr\u00c3\u00ada derivar en ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo arbitrario.<\/p>\n<p>El fallo se ha confirmado en la versi\u00c3\u00b3n 3.9.6, aunque otras podr\u00c3\u00adan<br \/>\nverse afectadas. El descubridor ha publicado el c\u00c3\u00b3digo de una prueba de<br \/>\nconcepto que permite aprovechar la vulnerabilidad.<\/p>\n<p>No se ha publicado versi\u00c3\u00b3n oficial que lo solucione, pero la<br \/>\nvulnerabilidad se ha corregido en el repositorio SVN.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Se ha encontrado una vulnerabilidad en la herramienta tcpdump que puede ser potencialmente aprovechada por un atacante para ejecutar c\u00c3\u00b3digo arbitrario si la v\u00c3\u00adctima procesa tr\u00c3\u00a1fico manipulado. Tcpdump, es un programa que coloca la tarjeta de red en modalidad promiscua y captura los paquetes que circulan por la red. Se trata de una herramienta muy [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-225","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump\",\"datePublished\":\"2007-07-22T23:12:56+00:00\",\"dateModified\":\"2007-07-22T23:43:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\"},\"wordCount\":218,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-07-22T23:12:56+00:00\",\"dateModified\":\"2007-07-22T23:43:11+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump","datePublished":"2007-07-22T23:12:56+00:00","dateModified":"2007-07-22T23:43:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/"},"wordCount":218,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/","url":"https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Ejecuci\u00c3\u00b3n de c\u00c3\u00b3digo a trav\u00c3\u00a9s de tr\u00c3\u00a1fico BGP en tcpdump","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-07-22T23:12:56+00:00","dateModified":"2007-07-22T23:43:11+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/ejecucion-de-codigo-a-traves-de-trafico-bgp-en-tcpdump\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=225"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/225\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}