First published: Tue Jul 17 2001(Updated: )
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1279 is considered to have a moderate severity level due to its potential to cause denial of service and execute arbitrary code.
To fix CVE-2001-1279, you should upgrade to a patched version of tcpdump, preferably beyond 3.6.2.
The impact of CVE-2001-1279 includes denial of service and the possibility of executing arbitrary code from remote attackers.
CVE-2001-1279 primarily affects tcpdump version 3.6.2 and potentially other versions in the 3.x series.
Yes, CVE-2001-1279 is a network security issue as it allows remote attackers to exploit vulnerabilities in network packet handling.