#VU19365 Buffer Over-read in Tcpdump - CVE-2019-1010220
Published: July 25, 2019 / Updated: October 22, 2019
Vulnerability identifier: #VU19365
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-1010220
CWE-ID: CWE-126
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Tcpdump
Tcpdump
Software vendor:
Tcpdump.org
Tcpdump.org
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to buffer over-read issue in the "print_prefix" function in "print-hncp.c" file via the "ND_PRINT((ndo, "%s", buf));" commponent. A remote attacker can trick a victim to open a specially crafted pcap file, trigger a buffer over-read condition and cause the affected application to crash.Remediation
Install update from vendor's website/