Debian update for tcpdump



Published: 2019-10-23
Risk Medium
Patch available YES
Number of vulnerabilities 24
CVE-ID CVE-2018-16228
CVE-2018-16229
CVE-2018-16227
CVE-2018-14882
CVE-2018-14881
CVE-2018-16230
CVE-2018-16300
CVE-2019-15166
CVE-2018-16452
CVE-2018-16451
CVE-2018-14880
CVE-2018-14879
CVE-2018-14463
CVE-2018-14464
CVE-2018-14462
CVE-2018-14461
CVE-2018-10105
CVE-2018-14465
CVE-2018-14466
CVE-2018-14470
CVE-2018-14469
CVE-2018-14468
CVE-2018-14467
CVE-2018-10103
CWE-ID CWE-125
CWE-835
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
tcpdump (Debian package)
Operating systems & Components / Operating system package or component

Vendor Debian

Security Bulletin

This security bulletin contains information about 24 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU22016

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-16228

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-hncp.c:print_prefix() within the HNCP parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Out-of-bounds read

EUVDB-ID: #VU22017

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-16229

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-dccp.c:dccp_print_option() within the DCCP parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Out-of-bounds read

EUVDB-ID: #VU22015

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-16227

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-802_11.c for the Mesh Flags subfield within the IEEE 802.11 parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds read

EUVDB-ID: #VU21998

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14882

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-icmp6.c within the ICMPv6 parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Out-of-bounds read

EUVDB-ID: #VU21997

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14881

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART) within the BGP parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Out-of-bounds read

EUVDB-ID: #VU22018

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-16230

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-bgp.c:bgp_attr_print() (MP_REACH_NLRI) within the BGP parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Infinite loop

EUVDB-ID: #VU22019

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2018-16300

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in print-bgp.c:bgp_attr_print() function in the BPG parser. A remote attacker can pass specially crafted data to the affected application, consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Buffer overflow

EUVDB-ID: #VU22023

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2019-15166

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error within the lmp_print_data_link_subobjs() function in print-lmp.c. A remote attacker can create a specially crafted LMP data, trigger memory corruption and perform a denial of service (DoS) attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Infinite loop

EUVDB-ID: #VU22022

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2018-16452

CWE-ID: CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to infinite loop in the smbutil.c:smb_fdata() function within the SMB parser. A remote attacker can consume all available system resources and cause denial of service conditions.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Out-of-bounds read

EUVDB-ID: #VU22021

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-16451

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-smb.c:print_trans() for MAILSLOTBROWSE and PIPELANMAN within the SMB parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Out-of-bounds read

EUVDB-ID: #VU21996

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14880

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-ospf6.c:ospf6_print_lshdr() within the OSPFv3 parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Buffer overflow

EUVDB-ID: #VU21995

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2018-14879

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the tcpdump.c:get_next_file() function in the command-line argument parser. A remote attacker can create a specially crafted file, trick the victim into opening it with the affected software, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

13) Out-of-bounds read

EUVDB-ID: #VU21987

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14463

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-vrrp.c:vrrp_print() function within the VRRP parser. A remote attacker can generate specially crafted VRRP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

14) Out-of-bounds read

EUVDB-ID: #VU21988

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14464

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-lmp.c:lmp_print_data_link_subobjs() function within the LMP parser. A remote attacker can generate specially crafted LMP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

15) Out-of-bounds read

EUVDB-ID: #VU21986

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14462

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-icmp.c:icmp_print() function within the ICMP parser. A remote attacker can generate specially crafted ICMP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

16) Out-of-bounds read

EUVDB-ID: #VU21985

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14461

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-ldp.c:ldp_tlv_print() within the LDP parser. A remote attacker can generate specially crafted LDP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

17) Out-of-bounds read

EUVDB-ID: #VU21984

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-10105

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when printing SMB data. A remote attacker can generate specially crafted SMB traffic, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

18) Out-of-bounds read

EUVDB-ID: #VU21989

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14465

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-rsvp.c:rsvp_obj_print() function within the RSVP parser. A remote attacker can generate specially crafted RSVP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

19) Out-of-bounds read

EUVDB-ID: #VU21990

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14466

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in print-rx.c:rx_cache_find() and rx_cache_insert() functions within the Rx parser. A remote attacker can generate specially crafted RSVP data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

20) Out-of-bounds read

EUVDB-ID: #VU21994

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14470

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-babel.c:babel_print_v2() within the Babel parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

21) Out-of-bounds read

EUVDB-ID: #VU21993

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14469

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-isakmp.c:ikev1_n_print() within the IKEv1 parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

22) Out-of-bounds read

EUVDB-ID: #VU21992

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14468

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-fr.c:mfr_print() within the FRF.16 parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

23) Out-of-bounds read

EUVDB-ID: #VU21991

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-14467

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP) within the BGP parser in tcpdump before 4.9.3. A remote attacker can generate specially crafted data, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

24) Out-of-bounds read

EUVDB-ID: #VU21982

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2018-10103

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when printing SMB data. A remote attacker can generate specially crafted SMB traffic, trigger out-of-bounds read error and perform denial of service attack.

Mitigation

Update the affected package to version: 4.9.3-1~deb9u1, 4.9.3-1~deb10u1.

Vulnerable software versions

tcpdump (Debian package): 4.9.0-1 - 4.9.3~git20190901-2


CPE2.3 External links

http://www.debian.org/security/2019/dsa-4547

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###