Debian Security Advisory DSA 1353-1 (tcpdump)

Summary
The remote host is missing an update to tcpdump announced via advisory DSA 1353-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201353-1
Insight
It was discovered that an integer overflow in the BGP dissector of tcpdump, a powerful tool for network monitoring and data acquisition, may lead to the execution of arbitrary code. For the oldstable distribution (sarge) this problem has been fixed in version 3.8.3-5sarge3. For the stable distribution (etch) this problem has been fixed in version 3.9.5-2etch1. For the unstable distribution (sid) this problem has been fixed in version 3.9.5-3. We recommend that you upgrade your tcpdump package.