Out-of-bounds read in Tcpdump - CVE-2015-0261
Published: August 3, 2017
Vulnerability identifier: #VU7689
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2015-0261
CWE-ID: CWE-125
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Tcpdump.org
Affected software:
Tcpdump
Tcpdump
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition or execute arbitrary code.
The weakness exists due to integer signedness error in the mobility_opt_print function in the IPv6 mobility printer A remote attacker can supply a negative length value, trigger out-of-bounds read, cause the system crash and possibly execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise
The weakness exists due to integer signedness error in the mobility_opt_print function in the IPv6 mobility printer A remote attacker can supply a negative length value, trigger out-of-bounds read, cause the system crash and possibly execute arbitrary code.
Successful exploitation of the vulnerability may result in system compromise
How to mitigate CVE-2015-0261
Update to version 4.7.2 or later.