First published: Thu Oct 03 2019(Updated: )
Last updated 24 July 2024
Credit: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tcpdump | 4.99.0-2+deb11u1 4.99.3-1 4.99.5-1 | |
macOS Catalina | <10.15.2 | 10.15.2 |
macOS Mojave | ||
macOS High Sierra | ||
tcpdump | <4.9.3 | |
Apple iOS and macOS | <10.15.2 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =29 | |
Fedora | =30 | |
Fedora | =31 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=5.2.0<=5.4.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=6.0.0<=6.1.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | =7.0.0 | |
F5 Access Policy Manager | >=11.6.0<=11.6.5 | |
F5 Access Policy Manager | >=12.1.0<=12.1.5 | |
F5 Access Policy Manager | >=13.1.0<=13.1.3 | |
F5 Access Policy Manager | >=14.0.0<=14.1.2 | |
F5 Access Policy Manager | >=15.0.0<=15.0.1 | |
F5 BIG-IP Advanced Firewall Manager | >=11.6.0<=11.6.5 | |
F5 BIG-IP Advanced Firewall Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Advanced Firewall Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Advanced Firewall Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Advanced Firewall Manager | >=15.0.0<=15.0.1 | |
F5 BIG-IP Analytics | >=11.6.0<=11.6.5 | |
F5 BIG-IP Analytics | >=12.1.0<=12.1.5 | |
F5 BIG-IP Analytics | >=13.1.0<=13.1.3 | |
F5 BIG-IP Analytics | >=14.0.0<=14.1.2 | |
F5 BIG-IP Analytics | >=15.0.0<=15.0.1 | |
f5 big-ip application acceleration manager | >=11.6.0<=11.6.5 | |
f5 big-ip application acceleration manager | >=12.1.0<=12.1.5 | |
f5 big-ip application acceleration manager | >=13.1.0<=13.1.3 | |
f5 big-ip application acceleration manager | >=14.0.0<=14.1.2 | |
f5 big-ip application acceleration manager | >=15.0.0<=15.0.1 | |
F5 Application Security Manager | >=11.6.0<=11.6.5 | |
F5 Application Security Manager | >=12.1.0<=12.1.5 | |
F5 Application Security Manager | >=13.1.0<=13.1.3 | |
F5 Application Security Manager | >=14.0.0<=14.1.2 | |
F5 Application Security Manager | >=15.0.0<=15.0.1 | |
f5 big-ip domain name system | >=11.6.0<=11.6.5 | |
f5 big-ip domain name system | >=12.1.0<=12.1.5 | |
f5 big-ip domain name system | >=13.1.0<=13.1.3 | |
f5 big-ip domain name system | >=14.0.0<=14.1.2 | |
f5 big-ip domain name system | >=15.0.0<=15.0.1 | |
F5 BIG-IP Edge Gateway | >=11.6.0<=11.6.5 | |
F5 BIG-IP Edge Gateway | >=12.1.0<=12.1.5 | |
F5 BIG-IP Edge Gateway | >=13.1.0<=13.1.3 | |
F5 BIG-IP Edge Gateway | >=14.0.0<=14.1.2 | |
F5 BIG-IP Edge Gateway | >=15.0.0<=15.0.1 | |
F5 BIG-IP fraud protection services | >=11.6.0<=11.6.5 | |
F5 BIG-IP fraud protection services | >=12.1.0<=12.1.5 | |
F5 BIG-IP fraud protection services | >=13.1.0<=13.1.3 | |
F5 BIG-IP fraud protection services | >=14.0.0<=14.1.2 | |
F5 BIG-IP fraud protection services | >=15.0.0<=15.0.1 | |
F5 BIG-IP Global Traffic Manager | >=11.6.0<=11.6.5 | |
F5 BIG-IP Global Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Global Traffic Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Global Traffic Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Global Traffic Manager | >=15.0.0<=15.0.1 | |
F5 BIG-IP | >=11.6.0<=11.6.5 | |
F5 BIG-IP | >=12.1.0<=12.1.5 | |
F5 BIG-IP | >=13.1.0<=13.1.3 | |
F5 BIG-IP | >=14.0.0<=14.1.2 | |
F5 BIG-IP | >=15.0.0<=15.0.1 | |
F5 BIG-IP Local Traffic Manager | >=11.6.0<=11.6.5 | |
F5 BIG-IP Local Traffic Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Local Traffic Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Local Traffic Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Local Traffic Manager | >=15.0.0<=15.0.1 | |
F5 BIG-IP Policy Enforcement Manager | >=11.6.0<=11.6.5 | |
F5 BIG-IP Policy Enforcement Manager | >=12.1.0<=12.1.5 | |
F5 BIG-IP Policy Enforcement Manager | >=13.1.0<=13.1.3 | |
F5 BIG-IP Policy Enforcement Manager | >=14.0.0<=14.1.2 | |
F5 BIG-IP Policy Enforcement Manager | >=15.0.0<=15.0.1 | |
F5 BIG-IP WebAccelerator | >=11.6.0<=11.6.5 | |
F5 BIG-IP WebAccelerator | >=12.1.0<=12.1.5 | |
F5 BIG-IP WebAccelerator | >=13.1.0<=13.1.3 | |
F5 BIG-IP WebAccelerator | >=14.0.0<=14.1.2 | |
F5 BIG-IP WebAccelerator | >=15.0.0<=15.0.1 | |
F5 Enterprise Manager | =3.1.1 | |
F5 iWorkflow | =2.3.0 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-14468 is classified as a high severity vulnerability due to its potential impact on systems using affected versions of tcpdump.
To fix CVE-2018-14468, you should update tcpdump to version 4.9.3 or later, and ensure your libpcap version is 1.9.1 or above.
Versions of tcpdump prior to 4.9.3 are affected by CVE-2018-14468 due to the buffer over-read issue.
CVE-2018-14468 affects various operating systems, including Apple macOS Catalina, Mojave, High Sierra, and specific versions of Debian and Fedora.
CVE-2018-14468 is categorized as a buffer over-read vulnerability in the FRF.16 parser of tcpdump.