First published: Wed Jan 05 2022(Updated: )
Tcpdump tcpslice is vulnerable to a denial of service, caused by a use-after-free flaw. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to cause a segmentation fault, and results in a denial of service condition.
Credit: security@tcpdump.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tcpslice | <1.5 | 1.5 |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance, Identity Manager | <=ISVG 10.0.2 | |
Tcpdump | <1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41043 is a vulnerability that occurs due to a use-after-free issue in tcpslice.
The use-after-free issue in tcpslice triggers the AddressSanitizer.
No, there are no other confirmed impacts of this vulnerability.
CVE-2021-41043 has a severity rating of medium (5.5).
To fix CVE-2021-41043, it is recommended to update tcpslice to a version above 1.5 or apply any patches or fixes provided by the vendor.