Executive Summary
Summary | |
---|---|
Title | tcpdump: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201502-05 | First vendor Publication | 2015-02-07 |
Vendor | Gentoo | Last vendor Modification | 2015-02-07 |
Severity (Vendor) | Normal | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities in tcpdump could result in execution of arbitrary code or Denial of Service. Background Description * The olsr_print function function contains an integer underflow error (CVE-2014-8767) Impact Workaround Resolution References Availability http://security.gentoo.org/glsa/glsa-201502-05.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201502-05.xml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25 % | CWE-191 | Integer Underflow (Wrap or Wraparound) |
25 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28335 | |||
Oval ID: | oval:org.mitre.oval:def:28335 | ||
Title: | USN-2433-1 -- tcpdump vulnerabilities | ||
Description: | Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8767">CVE-2014-8767</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8768">CVE-2014-8768</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing AODV packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, reveal sensitive information, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8769">CVE-2014-8769</a>) It was discovered that tcpdump incorrectly handled printing PPP packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9140">CVE-2014-9140</a>) In the default installation, attackers would be isolated by the tcpdump AppArmor profile. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2433-1 CVE-2014-8767 CVE-2014-8768 CVE-2014-8769 CVE-2014-9140 | Version: | 5 |
Platform(s): | Ubuntu 14.10 Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28411 | |||
Oval ID: | oval:org.mitre.oval:def:28411 | ||
Title: | DSA-3086-1 -- tcpdump security update | ||
Description: | Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3086-1 CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28766 | |||
Oval ID: | oval:org.mitre.oval:def:28766 | ||
Title: | Multiple vulnerabilities in current releases of the IBM SDK,Java Technology Edition | ||
Description: | tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-8769 | Version: | 5 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-11-24 | tcpdump 4.6.2 Geonet Decoder Denial of Service |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-557.nasl - Type : ACT_GATHER_INFO |
2017-04-27 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-1110-1.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO |
2015-04-09 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tcpdump-150320.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-267.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2015-125.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-102.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV67588.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68992.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68951.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68950.nasl - Type : ACT_GATHER_INFO |
2015-02-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-146.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201502-05.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16823.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tcpdump-141215.nasl - Type : ACT_GATHER_INFO |
2014-12-18 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16861.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-240.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15609.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2433-1.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15549.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3086.nasl - Type : ACT_GATHER_INFO |
2014-11-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15541.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2015-02-10 13:24:28 |
|
2015-02-08 00:22:13 |
|