Vulnerability identifier: #VU21990
Vulnerability risk: Low
Exploitation vector: Network
Exploit availability: No
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in print-rx.c:rx_cache_find() and rx_cache_insert() functions within the Rx parser. A remote attacker can generate specially crafted RSVP data, trigger out-of-bounds read error and perform denial of service attack.
Install updates from vendor's website.
Vulnerable software versions
Tcpdump: 4.9.0 - 4.9.2
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?