tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: ND_PRINT((ndo, %s, buf));, in function named print_prefix, in print-hncp.c. The attack vector is: The victim must open a specially crafted pcap file.
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Tcpdump | Tcpdump | 4.9.2 (including) | 4.9.2 (including) |
Tcpdump | Ubuntu | bionic | * |
Tcpdump | Ubuntu | disco | * |
Tcpdump | Ubuntu | trusty | * |
Tcpdump | Ubuntu | trusty/esm | * |
Tcpdump | Ubuntu | upstream | * |
Tcpdump | Ubuntu | xenial | * |