CVE Vulnerabilities

CVE-2014-8767

Published: Nov 20, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
2.9 LOW
AV:A/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

Affected Software

NameVendorStart VersionEnd Version
TcpdumpRedhat3.9.6 (including)3.9.6 (including)
TcpdumpRedhat3.9.7 (including)3.9.7 (including)
TcpdumpRedhat3.9.8 (including)3.9.8 (including)
TcpdumpRedhat4.0.0 (including)4.0.0 (including)
TcpdumpRedhat4.1.0 (including)4.1.0 (including)
TcpdumpRedhat4.1.1 (including)4.1.1 (including)
TcpdumpRedhat4.1.2 (including)4.1.2 (including)
TcpdumpRedhat4.2.1 (including)4.2.1 (including)
TcpdumpRedhat4.3.0 (including)4.3.0 (including)
TcpdumpRedhat4.3.1 (including)4.3.1 (including)
TcpdumpRedhat4.4.0 (including)4.4.0 (including)
TcpdumpRedhat4.5.0 (including)4.5.0 (including)
TcpdumpRedhat4.5.1 (including)4.5.1 (including)
TcpdumpRedhat4.5.2 (including)4.5.2 (including)
TcpdumpRedhat4.6.0 (including)4.6.0 (including)
TcpdumpRedhat4.6.1 (including)4.6.1 (including)
TcpdumpRedhat4.6.2 (including)4.6.2 (including)
TcpdumpUbuntuesm-infra-legacy/trusty*
TcpdumpUbuntulucid*
TcpdumpUbuntuprecise*
TcpdumpUbuntutrusty*
TcpdumpUbuntutrusty/esm*
TcpdumpUbuntuupstream*
TcpdumpUbuntuutopic*

References