CVE Vulnerabilities

CVE-2019-1010220

Buffer Over-read

Published: Jul 22, 2019 | Modified: Nov 21, 2024
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
5.4 N/A
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
Ubuntu
LOW

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: ND_PRINT((ndo, %s, buf));, in function named print_prefix, in print-hncp.c. The attack vector is: The victim must open a specially crafted pcap file.

Weakness

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.

Affected Software

Name Vendor Start Version End Version
Tcpdump Tcpdump 4.9.2 (including) 4.9.2 (including)
Tcpdump Ubuntu bionic *
Tcpdump Ubuntu disco *
Tcpdump Ubuntu trusty *
Tcpdump Ubuntu trusty/esm *
Tcpdump Ubuntu upstream *
Tcpdump Ubuntu xenial *

References