Description
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-8152 | The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump. |
Ubuntu USN |
USN-5331-1 | tcpdump vulnerabilities |
Ubuntu USN |
USN-5331-2 | tcpdump vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: Tcpdump
Published:
Updated: 2024-08-05T10:17:38.421Z
Reserved: 2018-08-31T00:00:00.000Z
Link: CVE-2018-16301
No data.
Status : Modified
Published: 2019-10-03T16:15:12.693
Modified: 2024-11-21T03:52:29.463
Link: CVE-2018-16301
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN