Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8036

Опубликовано: 29 фев. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

An out-of-bounds read vulnerability was discovered in tcpdump while printing SOME/IP packets captured in a pcap file or coming from the network. This flaw allows a remote attacker to send specially crafted packets that, when printed, can trigger the flaw and crash the application. The highest threat from this vulnerability is to system availability.

Отчет

This issue did not affect the versions of tcpdump as shipped with Red Hat Enterprise Linux 5, 6, 7, and 8, as they did not include support for the SOME/IP dissector.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5tcpdumpNot affected
Red Hat Enterprise Linux 6tcpdumpNot affected
Red Hat Enterprise Linux 7tcpdumpNot affected
Red Hat Enterprise Linux 8tcpdumpNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1895075tcpdump: the tok2strbuf function was used by the SOME/IP dissector in an unsafe way

EPSS

Процентиль: 62%
0.00433
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

CVSS3: 7.5
nvd
больше 5 лет назад

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

CVSS3: 7.5
debian
больше 5 лет назад

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SO ...

github
больше 3 лет назад

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

EPSS

Процентиль: 62%
0.00433
Низкий

7.5 High

CVSS3