CVE-2011-1935

pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote attackers to send arbitrary data while avoiding detection via crafted packets.
References
Link Resource
https://security-tracker.debian.org/tracker/CVE-2011-1935/ Issue Tracking Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=623868 Issue Tracking Patch Third Party Advisory
https://bugs.debian.org/cgi-bin/bugreport.cgi?att=1;bug=623868;filename=0001-Fix-the-calculation-of-the-frame-size-in-memory-mapp.patch;msg=10 Issue Tracking Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/02/08/5 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/05/19/11 Broken Link Issue Tracking Mailing List Patch Third Party Advisory
http://thread.gmane.org/gmane.network.tcpdump.devel/5018 Broken Link Issue Tracking Patch Third Party Advisory
http://article.gmane.org/gmane.network.tcpdump.devel/4968 Broken Link Issue Tracking Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:tcpdump:libpcap:*:*:*:*:*:*:*:*

Information

Published : 2017-10-20 11:29

Updated : 2021-06-15 07:44


NVD link : CVE-2011-1935

Mitre link : CVE-2011-1935


JSON object : View

Advertisement

dedicated server usa

Products Affected

tcpdump

  • libpcap