First published: Mon Nov 13 2017(Updated: )
tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.
Credit: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Tcpdump | =4.9.2 | |
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
ubuntu/tcpdump | <4.9.3-0ubuntu0.18.04.1 | 4.9.3-0ubuntu0.18.04.1 |
ubuntu/tcpdump | <4.9.3-0ubuntu0.14.04.1+ | 4.9.3-0ubuntu0.14.04.1+ |
ubuntu/tcpdump | <4.9.3-0ubuntu0.16.04.1 | 4.9.3-0ubuntu0.16.04.1 |
debian/tcpdump | 4.9.3-1~deb10u2 4.9.3-1~deb10u1 4.99.0-2+deb11u1 4.99.3-1 4.99.4-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)