Search CVE reports
1 – 10 of 192 results
CVE-2024-2397
Medium priorityDue to a bug in packet data buffers management, the PPP printer in tcpdump can enter an infinite loop when reading a crafted DLT_PPP_SERIAL .pcap savefile. This problem does not affect any tcpdump release, but it affected the git...
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | Not affected | Not affected | Not affected | Not affected | Not affected |
CVE-2023-1801
Medium priorityThe SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | Not affected | Not affected | Not affected | Not affected |
CVE-2020-8037
Low prioritySome fixes available 3 of 5
The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2020-8036
Low priorityThe tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | Not affected | Not affected | Not affected | Not affected |
CVE-2019-15167
Medium prioritySome fixes available 3 of 4
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | — | — | Fixed | Fixed |
CVE-2019-15166
Medium prioritySome fixes available 3 of 4
lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | — | — | Fixed | Fixed |
CVE-2018-16452
Medium prioritySome fixes available 3 of 4
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | — | — | Fixed | Fixed |
CVE-2018-16451
Medium prioritySome fixes available 3 of 4
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | — | — | Fixed | Fixed |
CVE-2018-16301
Low prioritySome fixes available 3 of 4
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name...
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2018-16300
Medium prioritySome fixes available 3 of 4
The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.
1 affected packages
tcpdump
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
tcpdump | — | — | — | Fixed | Fixed |