Описание
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 4.9.3-0ubuntu0.18.04.2 |
| devel | not-affected | 4.99.1-3build1 |
| esm-infra-legacy/trusty | needed | |
| esm-infra/bionic | released | 4.9.3-0ubuntu0.18.04.2 |
| esm-infra/focal | released | 4.9.3-4ubuntu0.1 |
| esm-infra/xenial | released | 4.9.3-0ubuntu0.16.04.1+esm1 |
| focal | released | 4.9.3-4ubuntu0.1 |
| impish | not-affected | 4.99.0-2 |
| jammy | not-affected | 4.99.1-3build1 |
| kinetic | not-affected | 4.99.1-3build1 |
Показывать по
EPSS
4.4 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
The command-line argument parser in tcpdump before 4.99.0 has a buffer ...
EPSS
4.4 Medium
CVSS2
7.8 High
CVSS3