Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2014:240 | First vendor Publication | 2014-12-14 |
Vendor | Mandriva | Last vendor Modification | 2014-12-14 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated tcpdump package fixes security vulnerabilities: The Tcpdump program could crash when processing a malformed OLSR payload when the verbose output flag was set (CVE-2014-8767). The application decoder for the Ad hoc On-Demand Distance Vector (AODV) protocol in Tcpdump fails to perform input validation and performs unsafe out-of-bound accesses. The application will usually not crash, but perform out-of-bounds accesses and output/leak larger amounts of invalid data, which might lead to dropped packets. It is unknown if a payload exists that might trigger segfaults (CVE-2014-8769). It was discovered that tcpdump incorrectly handled printing PPP packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2014-9140). |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28335 | |||
Oval ID: | oval:org.mitre.oval:def:28335 | ||
Title: | USN-2433-1 -- tcpdump vulnerabilities | ||
Description: | Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8767">CVE-2014-8767</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8768">CVE-2014-8768</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing AODV packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, reveal sensitive information, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8769">CVE-2014-8769</a>) It was discovered that tcpdump incorrectly handled printing PPP packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9140">CVE-2014-9140</a>) In the default installation, attackers would be isolated by the tcpdump AppArmor profile. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2433-1 CVE-2014-8767 CVE-2014-8768 CVE-2014-8769 CVE-2014-9140 | Version: | 5 |
Platform(s): | Ubuntu 14.10 Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28411 | |||
Oval ID: | oval:org.mitre.oval:def:28411 | ||
Title: | DSA-3086-1 -- tcpdump security update | ||
Description: | Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-3086-1 CVE-2014-8767 CVE-2014-8769 CVE-2014-9140 | Version: | 3 |
Platform(s): | Debian GNU/Linux 7.0 Debian GNU/kFreeBSD 7.0 | Product(s): | tcpdump |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28766 | |||
Oval ID: | oval:org.mitre.oval:def:28766 | ||
Title: | Multiple vulnerabilities in current releases of the IBM SDK,Java Technology Edition | ||
Description: | tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2014-8769 | Version: | 5 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-05-09 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-557.nasl - Type : ACT_GATHER_INFO |
2017-04-27 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-1110-1.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO |
2015-04-09 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tcpdump-150320.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-267.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2015-125.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-102.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV67588.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68992.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68951.nasl - Type : ACT_GATHER_INFO |
2015-03-19 | Name : The remote AIX host is missing a security patch. File : aix_IV68950.nasl - Type : ACT_GATHER_INFO |
2015-02-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2015-146.nasl - Type : ACT_GATHER_INFO |
2015-02-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201502-05.nasl - Type : ACT_GATHER_INFO |
2015-01-08 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16823.nasl - Type : ACT_GATHER_INFO |
2014-12-26 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_tcpdump-141215.nasl - Type : ACT_GATHER_INFO |
2014-12-18 | Name : The remote Fedora host is missing a security update. File : fedora_2014-16861.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2014-240.nasl - Type : ACT_GATHER_INFO |
2014-12-07 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15609.nasl - Type : ACT_GATHER_INFO |
2014-12-05 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2433-1.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15549.nasl - Type : ACT_GATHER_INFO |
2014-12-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3086.nasl - Type : ACT_GATHER_INFO |
2014-11-28 | Name : The remote Fedora host is missing a security update. File : fedora_2014-15541.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-12-16 13:25:48 |
|
2014-12-14 17:21:55 |
|