← Retour aux CVEs
CVE-2018-14468
HIGH7.5
Description
The FRF.16 parser in tcpdump before 4.9.3 has a buffer over-read in print-fr.c:mfr_print().
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie10/3/2019
Derniere modification12/3/2025
Sourcenvd
Observations honeypot0
Produits affectes
apple:mac_os_xdebian:debian_linuxf5:big-ip_access_policy_managerf5:big-ip_advanced_firewall_managerf5:big-ip_analyticsf5:big-ip_application_acceleration_managerf5:big-ip_application_security_managerf5:big-ip_domain_name_systemf5:big-ip_edge_gatewayf5:big-ip_fraud_protection_servicef5:big-ip_global_traffic_managerf5:big-ip_link_controllerf5:big-ip_local_traffic_managerf5:big-ip_policy_enforcement_managerf5:big-ip_webacceleratorf5:big-iq_centralized_managementf5:enterprise_managerf5:iworkflowf5:traffix_signaling_delivery_controllerfedoraproject:fedoraopensuse:leapredhat:enterprise_linuxtcpdump:tcpdump
Faiblesses (CWE)
CWE-125CWE-125
References
http://seclists.org/fulldisclosure/2019/Dec/26(cve@mitre.org)
https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/(cve@mitre.org)
https://seclists.org/bugtraq/2019/Dec/23(cve@mitre.org)
https://seclists.org/bugtraq/2019/Oct/28(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20200120-0001/(cve@mitre.org)
https://support.apple.com/kb/HT210788(cve@mitre.org)
https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS(cve@mitre.org)
https://usn.ubuntu.com/4252-1/(cve@mitre.org)
https://usn.ubuntu.com/4252-2/(cve@mitre.org)
https://www.debian.org/security/2019/dsa-4547(cve@mitre.org)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2019/Dec/26(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/the-tcpdump-group/tcpdump/commit/aa3e54f594385ce7e1e319b0c84999e51192578b(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Dec/23(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Oct/28(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200120-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/kb/HT210788(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K04367730?utm_source=f5support&%3Butm_medium=RSS(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4252-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4252-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4547(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.