First published: Fri Apr 07 2023(Updated: )
tcpdump. An out-of-bounds write issue was addressed with improved input validation.
Credit: CVE-2023-1801 CVE-2023-1801 CVE-2023-1801 security@tcpdump.org security@tcpdump.org
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
Tcpdump Tcpdump | =4.99.3 |
If using tcpdump 4.99.3, upgrade to 4.99.4.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-1801 is medium with a severity value of 6.5.
CVE-2023-1801 affects tcpdump version 4.99.3.
CVE-2023-1801 can result in an out-of-bounds write when decoding a crafted network packet.
To fix CVE-2023-1801, it is recommended to update tcpdump to a version that includes the necessary fixes.
You can find more information about CVE-2023-1801 on the official GitHub page and the Fedora project mailing list.