First published: Fri Mar 13 2015(Updated: )
A flaw was found in tcpdump's IPv6 mobility printer. A remote attacker could use this flaw to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. Upstream patch: <a href="http://www.ca.tcpdump.org/cve/0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch">http://www.ca.tcpdump.org/cve/0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpdump | <4.7.2 | 4.7.2 |
tcpdump tcpdump | <=4.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0261 is classified as a high severity vulnerability that can cause denial of service and potentially allow remote code execution.
To fix CVE-2015-0261, update tcpdump to version 4.7.3 or later.
CVE-2015-0261 affects tcpdump versions up to and including 4.7.2.
Yes, a remote attacker can exploit CVE-2015-0261 to cause tcpdump to crash.
Yes, an upstream patch has been released to address CVE-2015-0261.