Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-2153

Опубликовано: 09 мар. 2015
Источник: redhat
CVSS2: 6.8

Описание

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tcpdumpWill not fix
Red Hat Enterprise Linux 6tcpdumpWill not fix
Red Hat Enterprise Linux 7tcpdumpFixedRHSA-2017:187101.08.2017

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1201795tcpdump: tcp printer rpki_rtr_pdu_print() missing length check

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

nvd
почти 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

debian
почти 11 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer ...

github
больше 3 лет назад

The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).

suse-cvrf
почти 11 лет назад

Security update for tcpdump

6.8 Medium

CVSS2