7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
70.6%
Debian Security Advisory DSA-4547-1 [email protected]
https://www.debian.org/security/ Moritz Muehlenhoff
October 21, 2019 https://www.debian.org/security/faq
Package : tcpdump
CVE ID : CVE-2018-10103 CVE-2018-10105 CVE-2018-14461 CVE-2018-14462
CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466
CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470
CVE-2018-14879 CVE-2018-14880 CVE-2018-14881 CVE-2018-14882
CVE-2018-16227 CVE-2018-16228 CVE-2018-16229 CVE-2018-16230
CVE-2018-16300 CVE-2018-16451 CVE-2018-16452 CVE-2019-15166
Several vulnerabilities have been discovered in tcpdump, a command-line
network traffic analyzer. These vulnerabilities might result in denial of
service or, potentially, execution of arbitrary code.
For the oldstable distribution (stretch), these problems have been fixed
in version 4.9.3-1~deb9u1.
For the stable distribution (buster), these problems have been fixed in
version 4.9.3-1~deb10u1.
We recommend that you upgrade your tcpdump packages.
For the detailed security status of tcpdump please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/tcpdump
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 10 | mipsel | tcpdump | < 4.9.3-1~deb10u1 | tcpdump_4.9.3-1~deb10u1_mipsel.deb |
Debian | 9 | arm64 | tcpdump | < 4.9.3-1~deb9u1 | tcpdump_4.9.3-1~deb9u1_arm64.deb |
Debian | 8 | i386 | tcpdump | < 4.9.3-1~deb8u1 | tcpdump_4.9.3-1~deb8u1_i386.deb |
Debian | 9 | armhf | tcpdump | < 4.9.3-1~deb9u1 | tcpdump_4.9.3-1~deb9u1_armhf.deb |
Debian | 9 | ppc64el | tcpdump | < 4.9.3-1~deb9u1 | tcpdump_4.9.3-1~deb9u1_ppc64el.deb |
Debian | 10 | mips64el | tcpdump | < 4.9.3-1~deb10u1 | tcpdump_4.9.3-1~deb10u1_mips64el.deb |
Debian | 10 | mips | tcpdump | < 4.9.3-1~deb10u1 | tcpdump_4.9.3-1~deb10u1_mips.deb |
Debian | 9 | mips | tcpdump | < 4.9.3-1~deb9u1 | tcpdump_4.9.3-1~deb9u1_mips.deb |
Debian | 9 | mips64el | tcpdump-dbgsym | < 4.9.3-1~deb9u1 | tcpdump-dbgsym_4.9.3-1~deb9u1_mips64el.deb |
Debian | 9 | armel | tcpdump | < 4.9.3-1~deb9u1 | tcpdump_4.9.3-1~deb9u1_armel.deb |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.003 Low
EPSS
Percentile
70.6%