The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-10-03 09:15
Updated : 2020-01-20 05:15
NVD link : CVE-2018-14879
Mitre link : CVE-2018-14879
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
tcpdump
- tcpdump
redhat
- enterprise_linux
debian
- debian_linux
fedoraproject
- fedora
f5
- traffix_sdc
opensuse
- leap
apple
- mac_os_x