First published: Thu Apr 16 2015(Updated: )
print-wb.c in tcpdump before 4.7.4 allows remote attackers to cause a denial of service (segmentation fault and process crash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpdump | <4.7.4 | 4.7.4 |
tcpdump | <=4.7.3 | |
openSUSE | =42.2 | |
openSUSE Leap | =42.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3138 has a severity rating of medium due to its potential to cause denial of service.
To fix CVE-2015-3138, upgrade tcpdump to version 4.7.4 or later.
CVE-2015-3138 affects tcpdump versions prior to 4.7.4 and specific OpenSUSE Leap versions.
Yes, CVE-2015-3138 can be exploited remotely by sending crafted packets to tcpdump.
CVE-2015-3138 is a vulnerability that allows for a segmentation fault and process crash, leading to denial of service.