Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-14468

Опубликовано: 02 окт. 2019
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

An out-of-bounds read vulnerability was discovered in tcpdump while printing FRF.16 packets captured in a pcap file or coming from the network. A remote attacker may abuse this flaw by sending specially crafted packets that, when printed, would trigger the flaw and crash the application.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tcpdumpOut of support scope
Red Hat Enterprise Linux 6tcpdumpOut of support scope
Red Hat Enterprise Linux 7tcpdumpFix deferred
Red Hat Enterprise Linux 8tcpdumpFixedRHSA-2020:476004.11.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1760464tcpdump: Buffer over-read in mfr_print() function in print-fr.c

EPSS

Процентиль: 71%
0.00678
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

CVSS3: 7.5
nvd
около 6 лет назад

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

CVSS3: 7.5
debian
около 6 лет назад

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in pr ...

CVSS3: 7.5
github
больше 3 лет назад

The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().

oracle-oval
больше 5 лет назад

ELSA-2020-5662: tcpdump security update (IMPORTANT)

EPSS

Процентиль: 71%
0.00678
Низкий

7.5 High

CVSS3