Executive Summary

Informations
Name CVE-2014-9140 First vendor Publication 2014-12-05
Vendor Cve Last vendor Modification 2018-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28335
 
Oval ID: oval:org.mitre.oval:def:28335
Title: USN-2433-1 -- tcpdump vulnerabilities
Description: Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8767">CVE-2014-8767</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing GeoNet packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8768">CVE-2014-8768</a>) Steffen Bauch discovered that tcpdump incorrectly handled printing AODV packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, reveal sensitive information, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-8769">CVE-2014-8769</a>) It was discovered that tcpdump incorrectly handled printing PPP packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code. (<a href="http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9140">CVE-2014-9140</a>) In the default installation, attackers would be isolated by the tcpdump AppArmor profile.
Family: unix Class: patch
Reference(s): USN-2433-1
CVE-2014-8767
CVE-2014-8768
CVE-2014-8769
CVE-2014-9140
Version: 5
Platform(s): Ubuntu 14.10
Ubuntu 14.04
Ubuntu 12.04
Ubuntu 10.04
Product(s): tcpdump
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28411
 
Oval ID: oval:org.mitre.oval:def:28411
Title: DSA-3086-1 -- tcpdump security update
Description: Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer. These vulnerabilities might result in denial of service, leaking sensitive information from memory or, potentially, execution of arbitrary code.
Family: unix Class: patch
Reference(s): DSA-3086-1
CVE-2014-8767
CVE-2014-8769
CVE-2014-9140
Version: 3
Platform(s): Debian GNU/Linux 7.0
Debian GNU/kFreeBSD 7.0
Product(s): tcpdump
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 29

Information Assurance Vulnerability Management (IAVM)

Date Description
2015-08-20 IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X
Severity : Category I - VMSKEY : V0061337

Nessus® Vulnerability Scanner

Date Description
2015-08-17 Name : The remote host is missing a Mac OS X update that fixes multiple security vul...
File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO
2015-04-09 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_tcpdump-150320.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2015-125.nasl - Type : ACT_GATHER_INFO
2015-03-30 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-267.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-102.nasl - Type : ACT_GATHER_INFO
2015-03-18 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3193.nasl - Type : ACT_GATHER_INFO
2015-02-09 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201502-05.nasl - Type : ACT_GATHER_INFO
2015-01-08 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16823.nasl - Type : ACT_GATHER_INFO
2014-12-18 Name : The remote Fedora host is missing a security update.
File : fedora_2014-16861.nasl - Type : ACT_GATHER_INFO
2014-12-15 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2014-240.nasl - Type : ACT_GATHER_INFO
2014-12-05 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2433-1.nasl - Type : ACT_GATHER_INFO
2014-12-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3086.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
APPLE http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
BID http://www.securityfocus.com/bid/71468
BUGTRAQ http://www.securityfocus.com/archive/1/534829/100/0/threaded
CONFIRM http://advisories.mageia.org/MGASA-2014-0511.html
https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c...
https://support.apple.com/kb/HT205031
DEBIAN http://www.debian.org/security/2014/dsa-3086
http://www.debian.org/security/2015/dsa-3193
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
MISC http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Ex...
MLIST http://seclists.org/tcpdump/2014/q4/72
SUSE http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html
UBUNTU http://www.ubuntu.com/usn/USN-2433-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2021-05-04 12:35:05
  • Multiple Updates
2021-04-22 01:42:44
  • Multiple Updates
2020-05-23 01:53:48
  • Multiple Updates
2020-05-23 00:42:54
  • Multiple Updates
2018-10-10 00:19:53
  • Multiple Updates
2016-11-29 00:24:57
  • Multiple Updates
2016-04-27 01:30:07
  • Multiple Updates
2015-10-18 17:23:01
  • Multiple Updates
2015-08-18 13:34:54
  • Multiple Updates
2015-08-18 09:19:40
  • Multiple Updates
2015-04-10 13:28:06
  • Multiple Updates
2015-04-03 09:27:01
  • Multiple Updates
2015-04-02 09:26:19
  • Multiple Updates
2015-04-01 09:26:55
  • Multiple Updates
2015-03-31 13:29:03
  • Multiple Updates
2015-03-27 13:28:49
  • Multiple Updates
2015-03-26 09:26:53
  • Multiple Updates
2015-02-10 13:24:13
  • Multiple Updates
2015-01-09 13:26:19
  • Multiple Updates
2014-12-19 13:24:35
  • Multiple Updates
2014-12-16 13:25:39
  • Multiple Updates
2014-12-06 13:27:07
  • Multiple Updates
2014-12-05 21:27:33
  • First insertion