Action not permitted
Modal body text goes here.
Modal Title
Modal Body
Vulnerability from csaf_opensuse
Published
2019-10-20 18:19
Modified
2019-10-20 18:19
Summary
Security update for tcpdump
Notes
Title of the patch
Security update for tcpdump
Description of the patch
This update for tcpdump fixes the following issues:
- CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print and lookup_emem (bsc#1068716 bsc#1153098).
- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).
- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).
- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).
- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).
- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).
- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).
- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).
- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).
- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).
- CVE-2018-14470: Fixed a buffer over-read in print-babel.c:babel_print_v2 (bsc#1153098).
- CVE-2018-14879: Fixed a buffer overflow in the command-line argument parser (bsc#1153098).
- CVE-2018-14880: Fixed a buffer over-read in the OSPFv3 parser (bsc#1153098).
- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).
- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).
- CVE-2018-16227: Fixed a buffer over-read in the IEEE 802.11 parser in print-802_11.c for the Mesh Flags subfield (bsc#1153098).
- CVE-2018-16228: Fixed a buffer over-read in the HNCP parser (bsc#1153098).
- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).
- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).
- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).
- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).
- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN (bsc#1153098).
- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).
- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).
- CVE-2019-15167: Fixed a vulnerability in VRRP (bsc#1153098).
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames
openSUSE-2019-2348
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for tcpdump", title: "Title of the patch", }, { category: "description", text: "This update for tcpdump fixes the following issues:\n\n- CVE-2017-16808: Fixed a heap-based buffer over-read related to aoe_print and lookup_emem (bsc#1068716 bsc#1153098).\n- CVE-2018-10103: Fixed a mishandling of the printing of SMB data (bsc#1153098).\n- CVE-2018-10105: Fixed a mishandling of the printing of SMB data (bsc#1153098).\n- CVE-2018-14461: Fixed a buffer over-read in print-ldp.c:ldp_tlv_print (bsc#1153098).\n- CVE-2018-14462: Fixed a buffer over-read in print-icmp.c:icmp_print (bsc#1153098).\n- CVE-2018-14463: Fixed a buffer over-read in print-vrrp.c:vrrp_print (bsc#1153098).\n- CVE-2018-14464: Fixed a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs (bsc#1153098).\n- CVE-2018-14465: Fixed a buffer over-read in print-rsvp.c:rsvp_obj_print (bsc#1153098).\n- CVE-2018-14466: Fixed a buffer over-read in print-rx.c:rx_cache_find (bsc#1153098).\n- CVE-2018-14467: Fixed a buffer over-read in print-bgp.c:bgp_capabilities_print (bsc#1153098).\n- CVE-2018-14468: Fixed a buffer over-read in print-fr.c:mfr_print (bsc#1153098).\n- CVE-2018-14469: Fixed a buffer over-read in print-isakmp.c:ikev1_n_print (bsc#1153098).\n- CVE-2018-14470: Fixed a buffer over-read in print-babel.c:babel_print_v2 (bsc#1153098).\n- CVE-2018-14879: Fixed a buffer overflow in the command-line argument parser (bsc#1153098).\n- CVE-2018-14880: Fixed a buffer over-read in the OSPFv3 parser (bsc#1153098).\n- CVE-2018-14881: Fixed a buffer over-read in the BGP parser (bsc#1153098).\n- CVE-2018-14882: Fixed a buffer over-read in the ICMPv6 parser (bsc#1153098).\n- CVE-2018-16227: Fixed a buffer over-read in the IEEE 802.11 parser in print-802_11.c for the Mesh Flags subfield (bsc#1153098).\n- CVE-2018-16228: Fixed a buffer over-read in the HNCP parser (bsc#1153098).\n- CVE-2018-16229: Fixed a buffer over-read in the DCCP parser (bsc#1153098).\n- CVE-2018-16230: Fixed a buffer over-read in the BGP parser in print-bgp.c:bgp_attr_print (bsc#1153098).\n- CVE-2018-16300: Fixed an unlimited recursion in the BGP parser that allowed denial-of-service by stack consumption (bsc#1153098).\n- CVE-2018-16301: Fixed a buffer overflow (bsc#1153332 bsc#1153098).\n- CVE-2018-16451: Fixed several buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN (bsc#1153098).\n- CVE-2018-16452: Fixed a stack exhaustion in smbutil.c:smb_fdata (bsc#1153098).\n- CVE-2019-15166: Fixed a bounds check in lmp_print_data_link_subobjs (bsc#1153098).\n- CVE-2019-15167: Fixed a vulnerability in VRRP (bsc#1153098).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2019-2348", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2348-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2019:2348-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZPOIE2ZQZQ57X2YSWXD43L2MIX37I54G/#ZPOIE2ZQZQ57X2YSWXD43L2MIX37I54G", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2019:2348-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZPOIE2ZQZQ57X2YSWXD43L2MIX37I54G/#ZPOIE2ZQZQ57X2YSWXD43L2MIX37I54G", }, { category: "self", summary: "SUSE Bug 1068716", url: "https://bugzilla.suse.com/1068716", }, { category: "self", summary: "SUSE Bug 1153098", url: "https://bugzilla.suse.com/1153098", }, { category: "self", summary: "SUSE Bug 1153332", url: "https://bugzilla.suse.com/1153332", }, { category: "self", summary: "SUSE CVE CVE-2017-16808 page", url: "https://www.suse.com/security/cve/CVE-2017-16808/", }, { category: "self", summary: "SUSE CVE CVE-2018-10103 page", url: "https://www.suse.com/security/cve/CVE-2018-10103/", }, { category: "self", summary: "SUSE CVE CVE-2018-10105 page", url: "https://www.suse.com/security/cve/CVE-2018-10105/", }, { category: "self", summary: "SUSE CVE CVE-2018-14461 page", url: "https://www.suse.com/security/cve/CVE-2018-14461/", }, { category: "self", summary: "SUSE CVE CVE-2018-14462 page", url: "https://www.suse.com/security/cve/CVE-2018-14462/", }, { category: "self", summary: "SUSE CVE CVE-2018-14463 page", url: "https://www.suse.com/security/cve/CVE-2018-14463/", }, { category: "self", summary: "SUSE CVE CVE-2018-14464 page", url: "https://www.suse.com/security/cve/CVE-2018-14464/", }, { category: "self", summary: "SUSE CVE CVE-2018-14465 page", url: "https://www.suse.com/security/cve/CVE-2018-14465/", }, { category: "self", summary: "SUSE CVE CVE-2018-14466 page", url: "https://www.suse.com/security/cve/CVE-2018-14466/", }, { category: "self", summary: "SUSE CVE CVE-2018-14467 page", url: "https://www.suse.com/security/cve/CVE-2018-14467/", }, { category: "self", summary: "SUSE CVE CVE-2018-14468 page", url: "https://www.suse.com/security/cve/CVE-2018-14468/", }, { category: "self", summary: "SUSE CVE CVE-2018-14469 page", url: "https://www.suse.com/security/cve/CVE-2018-14469/", }, { category: "self", summary: "SUSE CVE CVE-2018-14470 page", url: "https://www.suse.com/security/cve/CVE-2018-14470/", }, { category: "self", summary: "SUSE CVE CVE-2018-14879 page", url: "https://www.suse.com/security/cve/CVE-2018-14879/", }, { category: "self", summary: "SUSE CVE CVE-2018-14880 page", url: "https://www.suse.com/security/cve/CVE-2018-14880/", }, { category: "self", summary: "SUSE CVE CVE-2018-14881 page", url: "https://www.suse.com/security/cve/CVE-2018-14881/", }, { category: "self", summary: "SUSE CVE CVE-2018-14882 page", url: "https://www.suse.com/security/cve/CVE-2018-14882/", }, { category: "self", summary: "SUSE CVE CVE-2018-16227 page", url: "https://www.suse.com/security/cve/CVE-2018-16227/", }, { category: "self", summary: "SUSE CVE CVE-2018-16228 page", url: "https://www.suse.com/security/cve/CVE-2018-16228/", }, { category: "self", summary: "SUSE CVE CVE-2018-16229 page", url: "https://www.suse.com/security/cve/CVE-2018-16229/", }, { category: "self", summary: "SUSE CVE CVE-2018-16230 page", url: "https://www.suse.com/security/cve/CVE-2018-16230/", }, { category: "self", summary: "SUSE CVE CVE-2018-16300 page", url: "https://www.suse.com/security/cve/CVE-2018-16300/", }, { category: "self", summary: "SUSE CVE CVE-2018-16301 page", url: "https://www.suse.com/security/cve/CVE-2018-16301/", }, { category: "self", summary: "SUSE CVE CVE-2018-16451 page", url: "https://www.suse.com/security/cve/CVE-2018-16451/", }, { category: "self", summary: "SUSE CVE CVE-2018-16452 page", url: "https://www.suse.com/security/cve/CVE-2018-16452/", }, { category: "self", summary: "SUSE CVE CVE-2019-1010220 page", url: "https://www.suse.com/security/cve/CVE-2019-1010220/", }, { category: "self", summary: "SUSE CVE CVE-2019-15166 page", url: "https://www.suse.com/security/cve/CVE-2019-15166/", }, { category: "self", summary: "SUSE CVE CVE-2019-15167 page", url: "https://www.suse.com/security/cve/CVE-2019-15167/", }, ], title: "Security update for tcpdump", tracking: { current_release_date: "2019-10-20T18:19:33Z", generator: { date: "2019-10-20T18:19:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2019:2348-1", initial_release_date: "2019-10-20T18:19:33Z", revision_history: [ { date: "2019-10-20T18:19:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "tcpdump-4.9.2-lp151.4.6.1.x86_64", product: { name: "tcpdump-4.9.2-lp151.4.6.1.x86_64", product_id: "tcpdump-4.9.2-lp151.4.6.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "tcpdump-4.9.2-lp151.4.6.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", }, product_reference: "tcpdump-4.9.2-lp151.4.6.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2017-16808", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-16808", }, ], notes: [ { category: "general", text: "tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-16808", url: "https://www.suse.com/security/cve/CVE-2017-16808", }, { category: "external", summary: "SUSE Bug 1068716 for CVE-2017-16808", url: "https://bugzilla.suse.com/1068716", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2017-16808", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "important", }, ], title: "CVE-2017-16808", }, { cve: "CVE-2018-10103", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10103", }, ], notes: [ { category: "general", text: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10103", url: "https://www.suse.com/security/cve/CVE-2018-10103", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-10103", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-10103", }, { cve: "CVE-2018-10105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10105", }, ], notes: [ { category: "general", text: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10105", url: "https://www.suse.com/security/cve/CVE-2018-10105", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-10105", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-10105", }, { cve: "CVE-2018-14461", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14461", }, ], notes: [ { category: "general", text: "The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14461", url: "https://www.suse.com/security/cve/CVE-2018-14461", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14461", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14461", }, { cve: "CVE-2018-14462", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14462", }, ], notes: [ { category: "general", text: "The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14462", url: "https://www.suse.com/security/cve/CVE-2018-14462", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14462", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14462", }, { cve: "CVE-2018-14463", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14463", }, ], notes: [ { category: "general", text: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14463", url: "https://www.suse.com/security/cve/CVE-2018-14463", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14463", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14463", }, { cve: "CVE-2018-14464", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14464", }, ], notes: [ { category: "general", text: "The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14464", url: "https://www.suse.com/security/cve/CVE-2018-14464", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14464", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14464", }, { cve: "CVE-2018-14465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14465", }, ], notes: [ { category: "general", text: "The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14465", url: "https://www.suse.com/security/cve/CVE-2018-14465", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14465", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14465", }, { cve: "CVE-2018-14466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14466", }, ], notes: [ { category: "general", text: "The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14466", url: "https://www.suse.com/security/cve/CVE-2018-14466", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14466", url: "https://bugzilla.suse.com/1153098", }, { category: "external", summary: "SUSE Bug 1166972 for CVE-2018-14466", url: "https://bugzilla.suse.com/1166972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14466", }, { cve: "CVE-2018-14467", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14467", }, ], notes: [ { category: "general", text: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14467", url: "https://www.suse.com/security/cve/CVE-2018-14467", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14467", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14467", }, { cve: "CVE-2018-14468", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14468", }, ], notes: [ { category: "general", text: "The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14468", url: "https://www.suse.com/security/cve/CVE-2018-14468", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14468", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14468", }, { cve: "CVE-2018-14469", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14469", }, ], notes: [ { category: "general", text: "The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14469", url: "https://www.suse.com/security/cve/CVE-2018-14469", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14469", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14469", }, { cve: "CVE-2018-14470", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14470", }, ], notes: [ { category: "general", text: "The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14470", url: "https://www.suse.com/security/cve/CVE-2018-14470", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14470", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14470", }, { cve: "CVE-2018-14879", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14879", }, ], notes: [ { category: "general", text: "The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14879", url: "https://www.suse.com/security/cve/CVE-2018-14879", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14879", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 0, baseSeverity: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "low", }, ], title: "CVE-2018-14879", }, { cve: "CVE-2018-14880", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14880", }, ], notes: [ { category: "general", text: "The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14880", url: "https://www.suse.com/security/cve/CVE-2018-14880", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14880", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14880", }, { cve: "CVE-2018-14881", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14881", }, ], notes: [ { category: "general", text: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14881", url: "https://www.suse.com/security/cve/CVE-2018-14881", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14881", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14881", }, { cve: "CVE-2018-14882", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14882", }, ], notes: [ { category: "general", text: "The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14882", url: "https://www.suse.com/security/cve/CVE-2018-14882", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-14882", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-14882", }, { cve: "CVE-2018-16227", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16227", }, ], notes: [ { category: "general", text: "The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16227", url: "https://www.suse.com/security/cve/CVE-2018-16227", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16227", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16227", }, { cve: "CVE-2018-16228", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16228", }, ], notes: [ { category: "general", text: "The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16228", url: "https://www.suse.com/security/cve/CVE-2018-16228", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16228", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16228", }, { cve: "CVE-2018-16229", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16229", }, ], notes: [ { category: "general", text: "The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16229", url: "https://www.suse.com/security/cve/CVE-2018-16229", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16229", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16229", }, { cve: "CVE-2018-16230", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16230", }, ], notes: [ { category: "general", text: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16230", url: "https://www.suse.com/security/cve/CVE-2018-16230", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16230", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16230", }, { cve: "CVE-2018-16300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16300", }, ], notes: [ { category: "general", text: "The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16300", url: "https://www.suse.com/security/cve/CVE-2018-16300", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16300", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "important", }, ], title: "CVE-2018-16300", }, { cve: "CVE-2018-16301", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16301", }, ], notes: [ { category: "general", text: "The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16301", url: "https://www.suse.com/security/cve/CVE-2018-16301", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16301", url: "https://bugzilla.suse.com/1153098", }, { category: "external", summary: "SUSE Bug 1153332 for CVE-2018-16301", url: "https://bugzilla.suse.com/1153332", }, { category: "external", summary: "SUSE Bug 1195825 for CVE-2018-16301", url: "https://bugzilla.suse.com/1195825", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "important", }, ], title: "CVE-2018-16301", }, { cve: "CVE-2018-16451", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16451", }, ], notes: [ { category: "general", text: "The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16451", url: "https://www.suse.com/security/cve/CVE-2018-16451", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16451", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16451", }, { cve: "CVE-2018-16452", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16452", }, ], notes: [ { category: "general", text: "The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16452", url: "https://www.suse.com/security/cve/CVE-2018-16452", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2018-16452", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2018-16452", }, { cve: "CVE-2019-1010220", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1010220", }, ], notes: [ { category: "general", text: "tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: \"ND_PRINT((ndo, \"%s\", buf));\", in function named \"print_prefix\", in \"print-hncp.c\". The attack vector is: The victim must open a specially crafted pcap file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1010220", url: "https://www.suse.com/security/cve/CVE-2019-1010220", }, { category: "external", summary: "SUSE Bug 1142439 for CVE-2019-1010220", url: "https://bugzilla.suse.com/1142439", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2019-1010220", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2019-1010220", }, { cve: "CVE-2019-15166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15166", }, ], notes: [ { category: "general", text: "lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15166", url: "https://www.suse.com/security/cve/CVE-2019-15166", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2019-15166", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2019-15166", }, { cve: "CVE-2019-15167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15167", }, ], notes: [ { category: "general", text: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15167", url: "https://www.suse.com/security/cve/CVE-2019-15167", }, { category: "external", summary: "SUSE Bug 1153098 for CVE-2019-15167", url: "https://bugzilla.suse.com/1153098", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.1:tcpdump-4.9.2-lp151.4.6.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-10-20T18:19:33Z", details: "moderate", }, ], title: "CVE-2019-15167", }, ], }
cve-2019-1010220
Vulnerability from cvelistv5
Published
2019-07-22 17:30
Modified
2024-08-05 03:07
Severity ?
EPSS score ?
Summary
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tcpdump.org | tcpdump |
Version: 4.9.2 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:07:18.432Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c", }, { name: "openSUSE-SU-2019:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "tcpdump", vendor: "tcpdump.org", versions: [ { status: "affected", version: "4.9.2", }, ], }, ], descriptions: [ { lang: "en", value: "tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: \"ND_PRINT((ndo, \"%s\", buf));\", in function named \"print_prefix\", in \"print-hncp.c\". The attack vector is: The victim must open a specially crafted pcap file.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:02", orgId: "7556d962-6fb7-411e-85fa-6cd62f095ba8", shortName: "dwf", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c", }, { name: "openSUSE-SU-2019:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve-assign@distributedweaknessfiling.org", ID: "CVE-2019-1010220", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "tcpdump", version: { version_data: [ { version_value: "4.9.2", }, ], }, }, ], }, vendor_name: "tcpdump.org", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: \"ND_PRINT((ndo, \"%s\", buf));\", in function named \"print_prefix\", in \"print-hncp.c\". The attack vector is: The victim must open a specially crafted pcap file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-126: Buffer Over-read", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c", }, { name: "https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c", }, { name: "openSUSE-SU-2019:1964", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7556d962-6fb7-411e-85fa-6cd62f095ba8", assignerShortName: "dwf", cveId: "CVE-2019-1010220", datePublished: "2019-07-22T17:30:14", dateReserved: "2019-03-20T00:00:00", dateUpdated: "2024-08-05T03:07:18.432Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14470
Vulnerability from cvelistv5
Published
2019-10-03 15:31
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.327Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:04", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14470", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14470", datePublished: "2019-10-03T15:31:18", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.327Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14469
Vulnerability from cvelistv5
Published
2019-10-03 15:29
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.644Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:17", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14469", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14469", datePublished: "2019-10-03T15:29:17", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.644Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14879
Vulnerability from cvelistv5
Published
2019-10-03 15:33
Modified
2024-08-05 09:46
Severity ?
EPSS score ?
Summary
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:46:23.862Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K51512510?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:23", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K51512510?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14879", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.f5.com/csp/article/K51512510?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K51512510?utm_source=f5support&utm_medium=RSS", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14879", datePublished: "2019-10-03T15:33:33", dateReserved: "2018-08-03T00:00:00", dateUpdated: "2024-08-05T09:46:23.862Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16229
Vulnerability from cvelistv5
Published
2019-10-03 15:48
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.462Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:22", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16229", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16229", datePublished: "2019-10-03T15:48:05", dateReserved: "2018-08-30T00:00:00", dateUpdated: "2024-08-05T10:17:38.462Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-10105
Vulnerability from cvelistv5
Published
2019-10-03 15:07
Modified
2024-08-05 07:32
Severity ?
EPSS score ?
Summary
tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:32:00.847Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:13", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-10105", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&utm_medium=RSS", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-10105", datePublished: "2019-10-03T15:07:15", dateReserved: "2018-04-14T00:00:00", dateUpdated: "2024-08-05T07:32:00.847Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16452
Vulnerability from cvelistv5
Published
2019-10-03 15:58
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:24:32.335Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:03", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16452", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16452", datePublished: "2019-10-03T15:58:44", dateReserved: "2018-09-03T00:00:00", dateUpdated: "2024-08-05T10:24:32.335Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16300
Vulnerability from cvelistv5
Published
2019-10-03 15:52
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.432Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:07", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16300", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16300", datePublished: "2019-10-03T15:52:39", dateReserved: "2018-08-31T00:00:00", dateUpdated: "2024-08-05T10:17:38.432Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14463
Vulnerability from cvelistv5
Published
2019-10-03 15:12
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.655Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-27T05:49:24", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14463", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14463", datePublished: "2019-10-03T15:12:23", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.655Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14880
Vulnerability from cvelistv5
Published
2019-10-03 15:35
Modified
2024-08-05 09:46
Severity ?
EPSS score ?
Summary
The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:46:23.859Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K56551263?utm_source=f5support&%3Butm_medium=RSS", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:08", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K56551263?utm_source=f5support&%3Butm_medium=RSS", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14880", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "https://support.f5.com/csp/article/K56551263?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K56551263?utm_source=f5support&utm_medium=RSS", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14880", datePublished: "2019-10-03T15:35:06", dateReserved: "2018-08-03T00:00:00", dateUpdated: "2024-08-05T09:46:23.859Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-10103
Vulnerability from cvelistv5
Published
2019-10-03 15:05
Modified
2024-08-05 07:32
Severity ?
EPSS score ?
Summary
tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T07:32:01.034Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-10103", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K44551633?utm_source=f5support&utm_medium=RSS", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-10103", datePublished: "2019-10-03T15:05:26", dateReserved: "2018-04-14T00:00:00", dateUpdated: "2024-08-05T07:32:01.034Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14461
Vulnerability from cvelistv5
Published
2019-10-03 15:09
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.626Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:06", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14461", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14461", datePublished: "2019-10-03T15:09:53", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.626Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14465
Vulnerability from cvelistv5
Published
2019-10-03 15:15
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.446Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:21", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14465", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14465", datePublished: "2019-10-03T15:15:01", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.446Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16230
Vulnerability from cvelistv5
Published
2019-10-03 15:49
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.407Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:25", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16230", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16230", datePublished: "2019-10-03T15:49:01", dateReserved: "2018-08-30T00:00:00", dateUpdated: "2024-08-05T10:17:38.407Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16301
Vulnerability from cvelistv5
Published
2019-10-03 15:55
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
References
â–Ľ | URL | Tags |
---|---|---|
https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
The Tcpdump Group | tcpdump |
Version: unspecified < 4.99.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.421Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "tcpdump", vendor: "The Tcpdump Group", versions: [ { lessThan: "4.99.0", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "Include Security and Mozilla Secure Open Source program", }, ], descriptions: [ { lang: "en", value: "The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190 integer overflow or wraparound", lang: "en", type: "CWE", }, ], }, { descriptions: [ { cweId: "CWE-787", description: "CWE-787 out-of-bounds write", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-09T17:11:35", orgId: "cfdbb673-b408-4d03-89c1-c3d73ed80896", shortName: "Tcpdump", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@tcpdump.org", ID: "CVE-2018-16301", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "tcpdump", version: { version_data: [ { version_affected: "<", version_value: "4.99.0", }, ], }, }, ], }, vendor_name: "The Tcpdump Group", }, ], }, }, credit: [ { lang: "eng", value: "Include Security and Mozilla Secure Open Source program", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-190 integer overflow or wraparound", }, ], }, { description: [ { lang: "eng", value: "CWE-787 out-of-bounds write", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "cfdbb673-b408-4d03-89c1-c3d73ed80896", assignerShortName: "Tcpdump", cveId: "CVE-2018-16301", datePublished: "2019-10-03T15:55:20", dateReserved: "2018-08-31T00:00:00", dateUpdated: "2024-08-05T10:17:38.421Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-16808
Vulnerability from cvelistv5
Published
2017-11-13 21:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T20:35:21.042Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1039773", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039773", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/issues/645", }, { name: "openSUSE-SU-2019:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "20191002 [slackware-security] tcpdump (SSA:2019-274-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-11-13T00:00:00", descriptions: [ { lang: "en", value: "tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:10", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1039773", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039773", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/issues/645", }, { name: "openSUSE-SU-2019:1964", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "20191002 [slackware-security] tcpdump (SSA:2019-274-01)", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/2", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-16808", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1039773", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039773", }, { name: "https://github.com/the-tcpdump-group/tcpdump/issues/645", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/issues/645", }, { name: "openSUSE-SU-2019:1964", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html", }, { name: "20191002 [slackware-security] tcpdump (SSA:2019-274-01)", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/2", }, { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-16808", datePublished: "2017-11-13T21:00:00", dateReserved: "2017-11-13T00:00:00", dateUpdated: "2024-08-05T20:35:21.042Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16228
Vulnerability from cvelistv5
Published
2019-10-03 15:46
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.385Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16228", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16228", datePublished: "2019-10-03T15:46:38", dateReserved: "2018-08-30T00:00:00", dateUpdated: "2024-08-05T10:17:38.385Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15167
Vulnerability from cvelistv5
Published
2022-08-27 05:47
Modified
2024-08-05 00:42
Severity ?
EPSS score ?
Summary
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.
References
â–Ľ | URL | Tags |
---|---|---|
https://github.com/the-tcpdump-group/tcpdump/commit/a152aebfd1114376ba266ed30416be596ef9d806 | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:42:03.726Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/a152aebfd1114376ba266ed30416be596ef9d806", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-08-27T05:47:36", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/a152aebfd1114376ba266ed30416be596ef9d806", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-15167", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/commit/a152aebfd1114376ba266ed30416be596ef9d806", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/a152aebfd1114376ba266ed30416be596ef9d806", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-15167", datePublished: "2022-08-27T05:47:36", dateReserved: "2019-08-19T00:00:00", dateUpdated: "2024-08-05T00:42:03.726Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16227
Vulnerability from cvelistv5
Published
2019-10-03 15:44
Modified
2024-08-05 10:17
Severity ?
EPSS score ?
Summary
The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:17:38.377Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:18", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16227", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16227", datePublished: "2019-10-03T15:44:35", dateReserved: "2018-08-30T00:00:00", dateUpdated: "2024-08-05T10:17:38.377Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14464
Vulnerability from cvelistv5
Published
2019-10-03 15:13
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.253Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:09", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14464", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14464", datePublished: "2019-10-03T15:13:31", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.253Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14467
Vulnerability from cvelistv5
Published
2019-10-03 15:24
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.316Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:14", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14467", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14467", datePublished: "2019-10-03T15:24:35", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.316Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-16451
Vulnerability from cvelistv5
Published
2019-10-03 15:57
Modified
2024-08-05 10:24
Severity ?
EPSS score ?
Summary
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T10:24:32.447Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:24", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-16451", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \\MAILSLOT\\BROWSE and \\PIPE\\LANMAN.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-16451", datePublished: "2019-10-03T15:57:34", dateReserved: "2018-09-03T00:00:00", dateUpdated: "2024-08-05T10:24:32.447Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14468
Vulnerability from cvelistv5
Published
2019-10-03 15:27
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.249Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14468", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.f5.com/csp/article/K04367730?utm_source=f5support&utm_medium=RSS", refsource: "CONFIRM", url: "https://support.f5.com/csp/article/K04367730?utm_source=f5support&utm_medium=RSS", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14468", datePublished: "2019-10-03T15:27:45", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.249Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14462
Vulnerability from cvelistv5
Published
2019-10-03 15:11
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.278Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:19", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14462", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14462", datePublished: "2019-10-03T15:11:19", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.278Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14882
Vulnerability from cvelistv5
Published
2019-10-03 15:41
Modified
2024-08-05 09:46
Severity ?
EPSS score ?
Summary
The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:46:23.777Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:20", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14882", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14882", datePublished: "2019-10-03T15:41:37", dateReserved: "2018-08-03T00:00:00", dateUpdated: "2024-08-05T09:46:23.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14881
Vulnerability from cvelistv5
Published
2019-10-03 15:36
Modified
2024-08-05 09:46
Severity ?
EPSS score ?
Summary
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:46:23.899Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:02", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14881", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14881", datePublished: "2019-10-03T15:36:44", dateReserved: "2018-08-03T00:00:00", dateUpdated: "2024-08-05T09:46:23.899Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-15166
Vulnerability from cvelistv5
Published
2019-10-03 16:01
Modified
2024-08-05 00:42
Severity ?
EPSS score ?
Summary
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:42:03.687Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "HIGH", attackVector: "PHYSICAL", availabilityImpact: "LOW", baseScore: 1.6, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-23T19:30:43", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, ], source: { discovery: "EXTERNAL", }, title: "lmp_print in tcpdump lacks certain boundary checks", x_generator: { engine: "Vulnogram 0.0.9", }, x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2019-15166", STATE: "PUBLIC", TITLE: "lmp_print in tcpdump lacks certain boundary checks", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.", }, ], }, generator: { engine: "Vulnogram 0.0.9", }, impact: { cvss: { attackComplexity: "HIGH", attackVector: "PHYSICAL", availabilityImpact: "LOW", baseScore: 1.6, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, ], }, source: { discovery: "EXTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2019-15166", datePublished: "2019-10-03T16:01:34", dateReserved: "2019-08-19T00:00:00", dateUpdated: "2024-08-05T00:42:03.687Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-14466
Vulnerability from cvelistv5
Published
2019-10-03 15:22
Modified
2024-08-05 09:29
Severity ?
EPSS score ?
Summary
The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:29:51.697Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/4252-1/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-05T03:06:11", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/4252-1/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14466", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", refsource: "MISC", url: "https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES", }, { name: "https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94", refsource: "CONFIRM", url: "https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94", }, { name: "[debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html", }, { name: "openSUSE-SU-2019:2344", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html", }, { name: "openSUSE-SU-2019:2348", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html", }, { name: "20191021 [SECURITY] [DSA 4547-1] tcpdump security update", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Oct/28", }, { name: "DSA-4547", refsource: "DEBIAN", url: "https://www.debian.org/security/2019/dsa-4547", }, { name: "FEDORA-2019-85d92df70f", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/", }, { name: "FEDORA-2019-d06bc63433", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/", }, { name: "FEDORA-2019-6db0d5b9d9", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/", }, { name: "https://support.apple.com/kb/HT210788", refsource: "CONFIRM", url: "https://support.apple.com/kb/HT210788", }, { name: "20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "BUGTRAQ", url: "https://seclists.org/bugtraq/2019/Dec/23", }, { name: "20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2019/Dec/26", }, { name: "https://security.netapp.com/advisory/ntap-20200120-0001/", refsource: "CONFIRM", url: "https://security.netapp.com/advisory/ntap-20200120-0001/", }, { name: "USN-4252-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-2/", }, { name: "USN-4252-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/4252-1/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14466", datePublished: "2019-10-03T15:22:55", dateReserved: "2018-07-20T00:00:00", dateUpdated: "2024-08-05T09:29:51.697Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.