ALT-BU-2020-4211-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2021-05257
Уязвимость эмуляции USB EHCI эмулятора аппаратного обеспечения QEMU, связанная с неправильным учетом ресурсов внешних эмуляторов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25723
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://security.netapp.com/advisory/ntap-20201218-0004/
- https://security.netapp.com/advisory/ntap-20201218-0004/
Closed vulnerabilities
BDU:2020-02115
Уязвимость компонента rpcapd/daemon.c библиотеки libpcap, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05681
Уязвимость компонента sf-pcapng.c библиотеки захвата сетевого трафика Libpcap, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2018-16301
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Modified: 2024-11-21
CVE-2019-15161
rpcapd/daemon.c in libpcap before 1.9.1 mishandles certain length values because of reuse of a variable. This may open up an attack vector involving extra data at the end of a request.
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea
- https://github.com/the-tcpdump-group/libpcap/commit/617b12c0339db4891d117b661982126c495439ea
- FEDORA-2019-eaa681d33e
- FEDORA-2019-eaa681d33e
- FEDORA-2019-b92ce3144a
- FEDORA-2019-b92ce3144a
- FEDORA-2019-4fe461079f
- FEDORA-2019-4fe461079f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- https://www.tcpdump.org/public-cve-list.txt
Modified: 2024-11-21
CVE-2019-15162
rpcapd/daemon.c in libpcap before 1.9.1 on non-Windows platforms provides details about why authentication failed, which might make it easier for attackers to enumerate valid usernames.
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
- https://github.com/the-tcpdump-group/libpcap/commit/484d60cbf7ca4ec758c3cbb8a82d68b244a78d58
- FEDORA-2019-eaa681d33e
- FEDORA-2019-eaa681d33e
- FEDORA-2019-b92ce3144a
- FEDORA-2019-b92ce3144a
- FEDORA-2019-4fe461079f
- FEDORA-2019-4fe461079f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- https://www.tcpdump.org/public-cve-list.txt
Modified: 2024-11-21
CVE-2019-15163
rpcapd/daemon.c in libpcap before 1.9.1 allows attackers to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
- https://github.com/the-tcpdump-group/libpcap/commit/437b273761adedcbd880f714bfa44afeec186a31
- FEDORA-2019-eaa681d33e
- FEDORA-2019-eaa681d33e
- FEDORA-2019-b92ce3144a
- FEDORA-2019-b92ce3144a
- FEDORA-2019-4fe461079f
- FEDORA-2019-4fe461079f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://support.f5.com/csp/article/K92862401?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K92862401?utm_source=f5support&%3Butm_medium=RSS
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- https://www.tcpdump.org/public-cve-list.txt
Modified: 2024-11-21
CVE-2019-15164
rpcapd/daemon.c in libpcap before 1.9.1 allows SSRF because a URL may be provided as a capture source.
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a
- https://github.com/the-tcpdump-group/libpcap/commit/33834cb2a4d035b52aa2a26742f832a112e90a0a
- FEDORA-2019-eaa681d33e
- FEDORA-2019-eaa681d33e
- FEDORA-2019-b92ce3144a
- FEDORA-2019-b92ce3144a
- FEDORA-2019-4fe461079f
- FEDORA-2019-4fe461079f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- https://www.tcpdump.org/public-cve-list.txt
Modified: 2024-11-21
CVE-2019-15165
sf-pcapng.c in libpcap before 1.9.1 does not properly validate the PHB header length before allocating memory.
- openSUSE-SU-2019:2345
- openSUSE-SU-2019:2345
- openSUSE-SU-2019:2343
- openSUSE-SU-2019:2343
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/blob/libpcap-1.9/CHANGES
- https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
- https://github.com/the-tcpdump-group/libpcap/commit/87d6bef033062f969e70fa40c43dfd945d5a20ab
- https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
- https://github.com/the-tcpdump-group/libpcap/commit/a5a36d9e82dde7265e38fe1f87b7f11c461c29f6
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1967-1] libpcap security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1967-1] libpcap security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2850-1] libpcap security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2850-1] libpcap security update
- FEDORA-2019-eaa681d33e
- FEDORA-2019-eaa681d33e
- FEDORA-2019-b92ce3144a
- FEDORA-2019-b92ce3144a
- FEDORA-2019-4fe461079f
- FEDORA-2019-4fe461079f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210785
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210789
- https://support.apple.com/kb/HT210790
- https://support.apple.com/kb/HT210790
- USN-4221-1
- USN-4221-1
- USN-4221-2
- USN-4221-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.tcpdump.org/public-cve-list.txt
- https://www.tcpdump.org/public-cve-list.txt
Closed vulnerabilities
BDU:2019-04648
Уязвимость функции print-vrrp.c:vrrp_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2019-04649
Уязвимость функции print-icmp.c:icmp_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2019-04650
Уязвимость функции print-ldp.c:ldp_tlv_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2019-04667
Уязвимость утилиты для перехвата и анализа сетевого трафика tcpdump, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2019-04668
Уязвимость утилиты для перехвата и анализа сетевого трафика tcpdump, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2019-04768
Уязвимость функции print-rsvp.c:rsvp_obj_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2019-04769
Уязвимость функции print-lmp.c:lmp_print_data_link_subobjs() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2019-04770
Уязвимость функции print-rx.c:rx_cache_find() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2019-04771
Уязвимость функции print-bgp.c:bgp_capabilities_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2019-04772
Уязвимость функции print-fr.c:mfr_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2019-04773
Уязвимость функции print-isakmp.c:ikev1_n_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2020-01356
Уязвимость функции tcpdump.c:get_next_file() утилиты для анализа сетевого трафика tcpdump, позволяющая нарушителю получить несанкционированный доступ к информации и оказать воздействие на ее целостность и доступность
BDU:2020-01357
Уязвимость функции print-ospf6.c:ospf6_print_lshdr() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01358
Уязвимость синтаксического анализатора утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01359
Уязвимость функции print-hncp.c:print_prefix() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01360
Уязвимость функции print-bgp.c:bgp_attr_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04873
Уязвимость утилиты для перехвата и анализа сетевого трафика tcpdump, вызванная переполнением буфера, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-04917
Уязвимость функции vrrp_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04918
Уязвимость функции ldp_tlv_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04919
Уязвимость функции icmp_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04921
Уязвимость реализации протокола SMB утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04923
Уязвимость реализации протокола SMB утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04926
Уязвимость функции lmp_print_data_link_subobjs () утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04964
Уязвимость компонента print-802_11.c утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04965
Уязвимость функции mfr_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04966
Уязвимость функции print_trans() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04967
Уязвимость функции babel_print_v2() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04968
Уязвимость функций rx_cache_find () и rx_cache_insert() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04969
Уязвимость функции mfr_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04970
Уязвимость функции rsvp_obj_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04981
Уязвимость функции bgp_capabilities_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04982
Уязвимость функции dccp_print_option() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04983
Уязвимость функции lmp_print_data_link_subobjs() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04984
Уязвимость функции bgp_capabilities_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04985
Уязвимость функции ikev1_n_print() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04986
Уязвимость функции smb_fdata() утилиты для перехвата и анализа сетевого трафика tcpdump, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05808
Уязвимость функции get_next_file утилиты UNIX tcpdump, связанная с недостатком механизма проверки размера входных данных приводящее к выходу операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к защищаемой информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации
BDU:2021-05237
Уязвимость программного обеспечения для анализа сетевого трафика tcpdump, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05290
Уязвимость функции print_prefix программного обеспечения для анализа сетевого трафика tcpdump, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2017-16808
tcpdump before 4.9.3 has a heap-based buffer over-read related to aoe_print in print-aoe.c and lookup_emem in addrtoname.c.
- openSUSE-SU-2019:1964
- openSUSE-SU-2019:1964
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html
- http://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 1039773
- 1039773
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/issues/645
- https://github.com/the-tcpdump-group/tcpdump/issues/645
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191002 [slackware-security] tcpdump (SSA:2019-274-01)
- 20191002 [slackware-security] tcpdump (SSA:2019-274-01)
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
Modified: 2024-11-21
CVE-2018-10103
tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-10105
tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14461
The LDP parser in tcpdump before 4.9.3 has a buffer over-read in print-ldp.c:ldp_tlv_print().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b
- https://github.com/the-tcpdump-group/tcpdump/commit/aa5c6b710dfd8020d2c908d6b3bd41f1da719b3b
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14462
The ICMP parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp.c:icmp_print().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
- https://github.com/the-tcpdump-group/tcpdump/commit/1a1bce0526a77b62e41531b00f8bb5e21fd4f3a3
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14463
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b
- https://github.com/the-tcpdump-group/tcpdump/commit/3de07c772166b7e8e8bb4b9d1d078f1d901b570b
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14464
The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220
- https://github.com/the-tcpdump-group/tcpdump/commit/d97e94223720684c6aa740ff219e0d19426c2220
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14465
The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in print-rsvp.c:rsvp_obj_print().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
- https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14466
The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94
- https://github.com/the-tcpdump-group/tcpdump/commit/c24922e692a52121e853a84ead6b9337f4c08a94
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14467
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9
- https://github.com/the-tcpdump-group/tcpdump/commit/e3f3b445e2d20ac5d5b7fcb7559ce6beb55da0c9
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14468
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b
- https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14469
The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c
- https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14470
The Babel parser in tcpdump before 4.9.3 has a buffer over-read in print-babel.c:babel_print_v2().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b
- https://github.com/the-tcpdump-group/tcpdump/commit/12f66f69f7bf1ec1266ddbee90a7616cbf33696b
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-14879
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K51512510?utm_source=f5support&%3Butm_medium=RSS
- USN-4252-1
- USN-4252-2
- DSA-4547
- openSUSE-SU-2019:2344
- DSA-4547
- USN-4252-2
- USN-4252-1
- https://support.f5.com/csp/article/K51512510?utm_source=f5support&%3Butm_medium=RSS
- https://support.apple.com/kb/HT210788
- https://security.netapp.com/advisory/ntap-20200120-0001/
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- FEDORA-2019-85d92df70f
- FEDORA-2019-d06bc63433
- FEDORA-2019-6db0d5b9d9
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- openSUSE-SU-2019:2348
Modified: 2024-11-21
CVE-2018-14880
The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.f5.com/csp/article/K56551263?utm_source=f5support&%3Butm_medium=RSS
- USN-4252-1
- USN-4252-2
- DSA-4547
- openSUSE-SU-2019:2344
- DSA-4547
- USN-4252-2
- USN-4252-1
- https://support.f5.com/csp/article/K56551263?utm_source=f5support&%3Butm_medium=RSS
- https://support.apple.com/kb/HT210788
- https://security.netapp.com/advisory/ntap-20200120-0001/
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- FEDORA-2019-85d92df70f
- FEDORA-2019-d06bc63433
- FEDORA-2019-6db0d5b9d9
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- openSUSE-SU-2019:2348
Modified: 2024-11-21
CVE-2018-14881
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-2
- DSA-4547
- openSUSE-SU-2019:2344
- DSA-4547
- USN-4252-2
- USN-4252-1
- https://support.apple.com/kb/HT210788
- https://security.netapp.com/advisory/ntap-20200120-0001/
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- FEDORA-2019-85d92df70f
- FEDORA-2019-d06bc63433
- FEDORA-2019-6db0d5b9d9
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- openSUSE-SU-2019:2348
Modified: 2024-11-21
CVE-2018-14882
The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-2
- DSA-4547
- openSUSE-SU-2019:2344
- DSA-4547
- USN-4252-2
- USN-4252-1
- https://support.apple.com/kb/HT210788
- https://security.netapp.com/advisory/ntap-20200120-0001/
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- FEDORA-2019-85d92df70f
- FEDORA-2019-d06bc63433
- FEDORA-2019-6db0d5b9d9
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- https://github.com/the-tcpdump-group/tcpdump/commit/d7505276842e85bfd067fa21cdb32b8a2dc3c5e4
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- openSUSE-SU-2019:2348
Modified: 2024-11-21
CVE-2018-16227
The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09
- https://github.com/the-tcpdump-group/tcpdump/commit/4846b3c5d0a850e860baf4f07340495d29837d09
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16228
The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
- https://github.com/the-tcpdump-group/tcpdump/commit/83a412a5275cac973c5841eca3511c766bed778d
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16229
The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66
- https://github.com/the-tcpdump-group/tcpdump/commit/211124b972e74f0da66bc8b16f181f78793e2f66
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16230
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f
- https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16300
The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a
- https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16301
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Modified: 2024-11-21
CVE-2018-16451
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6
- https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-16452
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
- https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2018-19519
In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.
- 106098
- 106098
- RHSA-2019:3976
- RHSA-2019:3976
- https://github.com/zyingp/temp/blob/master/tcpdump.md
- https://github.com/zyingp/temp/blob/master/tcpdump.md
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
Modified: 2024-11-21
CVE-2019-1010220
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.
- openSUSE-SU-2019:1964
- openSUSE-SU-2019:1964
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c
- https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c
- https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c
- https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
Modified: 2024-11-21
CVE-2019-15166
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2344
- openSUSE-SU-2019:2348
- openSUSE-SU-2019:2348
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191213 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
- https://github.com/the-tcpdump-group/tcpdump/commit/0b661e0aa61850234b64394585cf577aac570bf4
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- [debian-lts-announce] 20191011 [SECURITY] [DLA 1955-1] tcpdump security update
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-6db0d5b9d9
- FEDORA-2019-d06bc63433
- FEDORA-2019-d06bc63433
- FEDORA-2019-85d92df70f
- FEDORA-2019-85d92df70f
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191211 APPLE-SA-2019-12-10-3 macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- 20191021 [SECURITY] [DSA 4547-1] tcpdump security update
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://support.apple.com/kb/HT210788
- USN-4252-1
- USN-4252-1
- USN-4252-2
- USN-4252-2
- DSA-4547
- DSA-4547
Modified: 2024-11-21
CVE-2019-15167
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.