First published: Fri Mar 13 2015(Updated: )
A flaw was found in tcpdump's ethernet printer. A remote attacker could use this flaw to cause tcpdump to crash, resulting in a denial of service. Upstream patch: <a href="http://www.ca.tcpdump.org/cve/0002-test-case-files-for-CVE-2015-2153-2154-2155.patch">http://www.ca.tcpdump.org/cve/0002-test-case-files-for-CVE-2015-2153-2154-2155.patch</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpdump | <4.7.2 | 4.7.2 |
tcpdump tcpdump | <=4.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2154 has a severity rating that indicates it can cause denial of service due to remote exploitation.
To fix CVE-2015-2154, you should upgrade tcpdump to version 4.7.2 or a later version.
CVE-2015-2154 affects tcpdump versions up to 4.7.0.
Yes, a remote attacker can exploit CVE-2015-2154 to crash tcpdump.
Exploitation of CVE-2015-2154 can lead to a crash of the tcpdump application, resulting in a denial of service.