First published: Thu Oct 03 2019(Updated: )
Last updated 24 July 2024
Credit: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
debian/tcpdump | 4.99.0-2+deb11u1 4.99.3-1 4.99.5-1 | |
Tcpdump Tcpdump | <4.9.3 | |
F5 Traffix Signaling Delivery Controller | >=5.0.0<=5.1.0 | |
Apple Mac OS X | <10.15.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-14882 is a vulnerability in the ICMPv6 parser in tcpdump before version 4.9.3 that allows for a buffer over-read.
macOS Catalina 10.15.2, Apple Mojave, Apple High Sierra, tcpdump 4.9.3-1~deb10u2, 4.9.3-1~deb10u1, 4.99.0-2+deb11u1, 4.99.3-1, 4.99.4-3, tcpdump 4.9.3-0ubuntu0.18.04.1, tcpdump 4.9.3-0ubuntu0.14.04.1+, tcpdump 4.9.3, tcpdump 4.9.3-0ubuntu0.16.04.1.
The severity of CVE-2018-14882 is rated as high with a CVSS score of 7.5.
To fix CVE-2018-14882 on macOS Catalina 10.15.2, update to the latest tcpdump version 4.9.3.
You can find more information about CVE-2018-14882 at the following references: [link1](https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4), [link2](https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES), [link3](https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html).