Vulnerability identifier: #VU16161
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
Exploitation vector: Network
Exploit availability:
Vulnerable software:
Tcpdump
Server applications /
DLP, anti-spam, sniffers
Vendor: Tcpdump.org
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information or cause DoS condition.
The vulnerability exists in the print_prefix function, as defined in the print-hncp.c source code file of the affected software due to insufficient initialization of the buf variable. A remote attacker can trick the victim into execution of the tcpdumpcommand on a .pcap file that submits malicious input, trigger a stack-based buffer overread and access sensitive memory information or cause a DoS condition.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Tcpdump: 4.9.2
Fixed software versions
CPE
External links
http://github.com/zyingp/temp/blob/master/tcpdump.md
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?