Description
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-1962 | tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file. |
Ubuntu USN |
USN-4252-1 | tcpdump vulnerabilities |
Ubuntu USN |
USN-4252-2 | tcpdump vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: dwf
Published:
Updated: 2024-08-05T03:07:18.432Z
Reserved: 2019-03-20T00:00:00.000Z
Link: CVE-2019-1010220
No data.
Status : Modified
Published: 2019-07-22T18:15:11.027
Modified: 2024-11-21T04:18:03.980
Link: CVE-2019-1010220
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN