Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-1010220

Опубликовано: 22 июл. 2019
Источник: ubuntu
Приоритет: low
CVSS2: 4.3
CVSS3: 3.3

Описание

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.

РелизСтатусПримечание
bionic

released

4.9.3-0ubuntu0.18.04.1
devel

not-affected

4.9.3-4
disco

ignored

end of life
eoan

not-affected

4.9.3-2
esm-infra-legacy/trusty

released

4.9.3-0ubuntu0.14.04.1+esm1
esm-infra/bionic

released

4.9.3-0ubuntu0.18.04.1
esm-infra/xenial

released

4.9.3-0ubuntu0.16.04.1
precise/esm

not-affected

4.9.3-0ubuntu0.12.04.1
trusty

ignored

end of standard support
trusty/esm

released

4.9.3-0ubuntu0.14.04.1+esm1

Показывать по

4.3 Medium

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 5.4
redhat
больше 6 лет назад

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.

CVSS3: 3.3
nvd
больше 6 лет назад

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.

CVSS3: 3.3
debian
больше 6 лет назад

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. T ...

CVSS3: 3.3
github
больше 3 лет назад

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.

CVSS3: 3.3
fstec
больше 6 лет назад

Уязвимость утилиты для перехвата и анализа сетевого трафика tcpdump, вызванная переполнением буфера, позволяющая нарушителю раскрыть защищаемую информацию

4.3 Medium

CVSS2

3.3 Low

CVSS3