OpenSUSE Linux update for tcpdump



Published: 2019-08-20
Risk Medium
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2017-16808
CVE-2019-1010220
CWE-ID CWE-126
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Opensuse
Operating systems & Components / Operating system

Vendor SUSE

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Heap-based buffer overread

EUVDB-ID: #VU9337

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-16808

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to heap-based buffer overread in 'addrtoname.c' when handling malicious input. A remote attacker can supply a specially crafted pcap fil, trigger buffer overread and cause the service to crash.

Successful exploitation of the vulnerability results in denial of service.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.0 - 15.1

External links

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer Over-read

EUVDB-ID: #VU19365

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-1010220

CWE-ID: CWE-126 - Buffer over-read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to buffer over-read issue in the "print_prefix" function in "print-hncp.c" file via the "ND_PRINT((ndo, "%s", buf));" commponent. A remote attacker can trick a victim to open a specially crafted pcap file, trigger a buffer over-read condition and cause the affected application to crash.

Mitigation

Update the affected packages.

Vulnerable software versions

Opensuse: 15.0 - 15.1

External links

http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###