Page 24 of 191 results (0.016 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Several protocol parsers in tcpdump before 4.9.2 could cause a buffer over-read in addrtoname.c:lookup_bytestring(). Varios analizadores sintácticos de protocolos en tcpdump en versiones anteriores a la 4.9.2 podrían provocar una sobrelectura de búfer en addrtoname.c:lookup_bytestring(). • http://www.debian.org/security/2017/dsa-3971 http://www.securitytracker.com/id/1039307 http://www.tcpdump.org/tcpdump-changes.txt https://access.redhat.com/errata/RHEA-2018:0705 https://github.com/the-tcpdump-group/tcpdump/commit/730fc35968c5433b9e2a829779057f4f9495dc51 https://security.gentoo.org/glsa/201709-23 https://support.apple.com/HT208221 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 16%CPEs: 1EXPL: 1

tcpdump 4.9.0 has a buffer overflow in the sliplink_print function in print-sl.c. tcpdump 4.9.0 presenta un desbordamiento de búfer en la función sliplink_print en print-sl.c. • http://www.debian.org/security/2017/dsa-3971 http://www.securityfocus.com/bid/99939 http://www.securitytracker.com/id/1039307 https://access.redhat.com/errata/RHEA-2018:0705 https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/global-overflow/print-sl https://security.gentoo.org/glsa/201709-23 https://support.apple.com/HT208221 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 1

tcpdump 4.9.0 has a heap-based buffer over-read in the pimv1_print function in print-pim.c. tcpdump 4.9.0 presenta una sobrelectura de búfer basada en memoria dinámica (heap) en la función pimv1_print en print-pim.c. • http://www.debian.org/security/2017/dsa-3971 http://www.securityfocus.com/bid/99940 http://www.securitytracker.com/id/1039307 https://access.redhat.com/errata/RHEA-2018:0705 https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/print-pim https://security.gentoo.org/glsa/201709-23 https://support.apple.com/HT208221 • CWE-125: Out-of-bounds Read •

CVSS: 9.8EPSS: 4%CPEs: 1EXPL: 1

tcpdump 4.9.0 has a heap-based buffer over-read in the lldp_print function in print-lldp.c, related to util-print.c. tcpdump 4.9.0 presenta una sobrelectura de búfer basada en memoria dinámica (heap) en la función lldp_print en print-lldp.c. Esto está relacionado con to util-print.c. • http://www.debian.org/security/2017/dsa-3971 http://www.securityfocus.com/bid/99941 http://www.securitytracker.com/id/1039307 https://access.redhat.com/errata/RHEA-2018:0705 https://github.com/hackerlib/hackerlib-vul/tree/master/tcpdump-vul/heap-buffer-overflow/util-print https://security.gentoo.org/glsa/201709-23 https://support.apple.com/HT208221 • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol. tcpdump 4.9.0 permite que atacantes remotos provoquen una denegación de servicio (sobrelectura de búfer basada en memoria dinámica o heap y cierre inesperado de aplicación) mediante datos de paquetes manipulados. El cierre inesperado ocurre en la función EXTRACT_16BITS que es llamada desde la función stp_print por el protocolo Spanning Tree (STP). • http://www.debian.org/security/2017/dsa-3971 https://access.redhat.com/errata/RHEA-2018:0705 https://bugzilla.redhat.com/show_bug.cgi?id=1468504 https://security.gentoo.org/glsa/201709-23 https://support.apple.com/HT208221 • CWE-125: Out-of-bounds Read •