Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2014/Nov/48 | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/71155 | Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2433-1 | Third Party Advisory |
http://www.exploit-db.com/exploits/35359 | Exploit Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98766 | |
http://www.securityfocus.com/archive/1/534010/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
AND |
|
Information
Published : 2014-11-20 09:50
Updated : 2018-10-30 09:27
NVD link : CVE-2014-8768
Mitre link : CVE-2014-8768
JSON object : View
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
Products Affected
canonical
- ubuntu_linux
opensuse
- opensuse
redhat
- tcpdump
oracle
- solaris