Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2153

Опубликовано: 09 мар. 2015
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tcpdumpWill not fix
Red Hat Enterprise Linux 6tcpdumpWill not fix
Red Hat Enterprise Linux 7tcpdumpFixedRHSA-2017:187101.08.2017

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1201795tcpdump: tcp printer rpki_rtr_pdu_print() missing length check

EPSS

Процентиль: 94%
0.11322
Средний

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

nvd
около 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

debian
около 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer ...

github
почти 4 года назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

suse-cvrf
около 11 лет назад

Security update for tcpdump

EPSS

Процентиль: 94%
0.11322
Средний

6.8 Medium

CVSS2