First published: Fri Mar 13 2015(Updated: )
A flaw was found in tcpdump's force printer. A remote attacker could use this flaw to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. Upstream patch: <a href="http://www.ca.tcpdump.org/cve/0002-test-case-files-for-CVE-2015-2153-2154-2155.patch">http://www.ca.tcpdump.org/cve/0002-test-case-files-for-CVE-2015-2153-2154-2155.patch</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpdump | <4.7.2 | 4.7.2 |
Debian | =7.0 | |
Debian | =8.0 | |
Fedora | =21 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 | |
Oracle Solaris and Zettabyte File System (ZFS) | =11.2 | |
Tcpdump | <=4.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2155 is classified as a medium severity vulnerability due to its potential to cause denial of service or arbitrary code execution.
To fix CVE-2015-2155, you should update tcpdump to version 4.7.3 or later.
CVE-2015-2155 affects tcpdump versions up to and including 4.7.0.
CVE-2015-2155 can be exploited by remote attackers to crash tcpdump or potentially execute unauthorized code.
Yes, an upstream patch for CVE-2015-2155 is available that addresses the issue.