Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-16301

Опубликовано: 30 сент. 2019
Источник: redhat
CVSS3: 5.3

Описание

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

Отчет

This flaw has been rated as having a security impact of Low. See the discussion on upstream issue https://github.com/the-tcpdump-group/libpcap/issues/855 for more information.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tcpdumpOut of support scope
Red Hat Enterprise Linux 7tcpdumpOut of support scope
Red Hat Enterprise Linux 8tcpdumpFix deferred
Red Hat Enterprise Linux 9tcpdumpNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-120
https://bugzilla.redhat.com/show_bug.cgi?id=1760500tcpdump: Buffer overflow in the -F command line argument parser

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

CVSS3: 7.8
nvd
почти 6 лет назад

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 6 лет назад

The command-line argument parser in tcpdump before 4.99.0 has a buffer ...

suse-cvrf
больше 3 лет назад

Security update for tcpdump

5.3 Medium

CVSS3