Описание
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 4.9.3-0ubuntu0.18.04.2 |
devel | not-affected | 4.99.1-3build1 |
esm-infra-legacy/trusty | needed | |
esm-infra/bionic | not-affected | 4.9.3-0ubuntu0.18.04.2 |
esm-infra/focal | not-affected | 4.9.3-4ubuntu0.1 |
esm-infra/xenial | released | 4.9.3-0ubuntu0.16.04.1+esm1 |
focal | released | 4.9.3-4ubuntu0.1 |
impish | not-affected | 4.99.0-2 |
jammy | not-affected | 4.99.1-3build1 |
kinetic | not-affected | 4.99.1-3build1 |
Показывать по
EPSS
4.4 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
The command-line argument parser in tcpdump before 4.99.0 has a buffer ...
EPSS
4.4 Medium
CVSS2
7.8 High
CVSS3