The ICMP parser in tcpdump is vulnerable to denial of service. A buffer over-read in print-icmp.c:icmp_print()
allows an attacker to crash the application.
CPE | Name | Operator | Version |
---|---|---|---|
tcpdump | eq | 4.9.2-r4 | |
tcpdump | eq | 4.9.2__5.el8 | |
tcpdump | eq | 4.9.2-r4 | |
tcpdump | eq | 4.9.2__5.el8 |
lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
seclists.org/fulldisclosure/2019/Dec/26
github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
lists.debian.org/debian-lts-announce/2019/10/msg00015.html
lists.fedoraproject.org/archives/list/[email protected]/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
lists.fedoraproject.org/archives/list/[email protected]/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
lists.fedoraproject.org/archives/list/[email protected]/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
seclists.org/bugtraq/2019/Dec/23
seclists.org/bugtraq/2019/Oct/28
security.netapp.com/advisory/ntap-20200120-0001/
support.apple.com/kb/HT210788
www.debian.org/security/2019/dsa-4547