CVE Vulnerabilities

CVE-2019-1010220

Buffer Over-read

Published: Jul 22, 2019 | Modified: Nov 21, 2024
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.4 N/A
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: ND_PRINT((ndo, %s, buf));, in function named print_prefix, in print-hncp.c. The attack vector is: The victim must open a specially crafted pcap file.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

NameVendorStart VersionEnd Version
TcpdumpTcpdump4.9.2 (including)4.9.2 (including)
TcpdumpUbuntubionic*
TcpdumpUbuntudisco*
TcpdumpUbuntuesm-infra-legacy/trusty*
TcpdumpUbuntuesm-infra/bionic*
TcpdumpUbuntuesm-infra/xenial*
TcpdumpUbuntutrusty*
TcpdumpUbuntutrusty/esm*
TcpdumpUbuntuupstream*
TcpdumpUbuntuxenial*

References