First published: Mon Jul 22 2019(Updated: )
Last updated 24 July 2024
Credit: josh@bress.net josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Tcpdump Tcpdump | =4.9.2 | |
debian/tcpdump | <=4.99.0-2+deb11u1<=4.99.3-1<=4.99.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-1010220.
The impact is the potential exposure of Saved Frame Pointer, Return Address, etc. on the stack.
The component affected is line 234: "ND_PRINT((ndo, "%s", buf));", in the function named "print_prefix", in "print-hncp.c".
The attack vector requires the victim to open a maliciously crafted packet capture file or be on a network where malicious packets are being captured.
To fix the vulnerability, update tcpdump to version 4.9.3 or later.