First published: Thu Oct 03 2019(Updated: )
Last updated 24 July 2024
Credit: CVE-2017-16808 CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882 CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230 CVE-2018-16300 CVE-2018-16301 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166 CVE-2019-15167 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Tcpdump | <4.9.3 | |
Apple Mac OS X | <10.15.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Apple macOS Catalina | <10.15.2 | 10.15.2 |
Apple Mojave | ||
Apple High Sierra | ||
debian/tcpdump | 4.99.0-2+deb11u1 4.99.3-1 4.99.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this tcpdump issue is CVE-2018-16230.
The affected software versions include tcpdump version 4.9.3 and libpcap version 1.9.
The severity of CVE-2018-16230 is not specified in the provided information. Please refer to the references for more details.
You can fix the tcpdump vulnerability by updating to tcpdump version 4.9.3 or later.
You can find more information about this tcpdump vulnerability in the provided references.