Page 33 of 184 results (0.009 seconds)

CVSS: 5.0EPSS: 8%CPEs: 15EXPL: 4

Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame. Múltiples subdesbordamientos de enteros en la función geonet_print en tcpdump 4.5.0 hasta 4.6.2, cuando se utiliza el modo verbose, permite a atacantes remotos causar una denegación de servicio (fallo de segmentación y caída) a través de un valor de longitud manipulado en un Frame Geonet. tcpdump versions 4.5.0 through 4.6.2 suffers from a denial of service vulnerability when handling a malformed Geonet payload. • https://www.exploit-db.com/exploits/35359 http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html http://packetstormsecurity.com/files/129156/tcpdump-4.6.2-Geonet-Denial-Of-Service.html http://seclists.org/fulldisclosure/2014/Nov/48 http://www.exploit-db.com/exploits/35359 http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html http://www.securityfocus.com/archive/1/534010/100/0/threaded http://www.securityfocus.com/bid/71155 http://www.ubuntu.com/ • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 5.0EPSS: 5%CPEs: 19EXPL: 3

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame. Subdesbordamiento de enteros en la función olsr_print en tcpdump 3.9.6 hasta 4.6.2, cuando está en el modo verbose, permite a atacantes remotos causar una denegación de servicio(caída) a través de valor de longitud manipulado en un Frame OLSR. tcpdump versions 3.9.6 through 4.6.2 suffers from a denial of service vulnerability when handling a malformed OLSR payload. • http://advisories.mageia.org/MGASA-2014-0503.html http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html http://seclists.org/fulldisclosure/2014/Nov/47 http://www.debian.org/security/2014/dsa-3086 http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 http://www.mandriva.com/security/advisories?name=MDVSA-2015: • CWE-189: Numeric Errors •

CVSS: 9.8EPSS: 68%CPEs: 49EXPL: 2

Integer overflow in print-bgp.c in the BGP dissector in tcpdump 3.9.6 and earlier allows remote attackers to execute arbitrary code via crafted TLVs in a BGP packet, related to an unchecked return value. Un desbordamiento de enteros en el archivo print-bgp.c en el disector BGP en tcpdump versión 3.9.6 y anteriores, permite a atacantes remotos ejecutar código arbitrario por medio de TLVs especialmente diseñados en un paquete BGP, relacionado a un valor de retorno no comprobado. • https://www.exploit-db.com/exploits/30319 http://bugs.gentoo.org/show_bug.cgi?id=184815 http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12 http://docs.info.apple.com/article.html?artnum=307179 http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://secunia.com/advisories/26135 http://secunia.com/advisories/26168 http://secunia.com/advisories/26223 http://secunia.com/advisories/26231 http://secunia.com&# • CWE-190: Integer Overflow or Wraparound CWE-252: Unchecked Return Value •

CVSS: 6.8EPSS: 4%CPEs: 1EXPL: 0

Off-by-one buffer overflow in the parse_elements function in the 802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier allows remote attackers to cause a denial of service (crash) via a crafted 802.11 frame. NOTE: this was originally referred to as heap-based, but it might be stack-based. Desbordamiento de búfer de error de superación de limite en la función parse_elements en código de impresión 802.11 (print-802_11.c) para tcpdump 3.9.5 y anteriores permite a atacantes remotos provocar denegación de servicio (caida) a través de ventanas manipuladas 802.11. NOTA: esto fue originalmente referenciado como basado en montón, pero podría estar basado en pila. • http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.31.2.11&r2=1.31.2.12 http://docs.info.apple.com/article.html?artnum=307179 http://fedoranews.org/cms/node/2798 http://fedoranews.org/cms/node/2799 http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html http://seclists.org/fulldisclosure/2007/Mar/0003.html http://secunia.com/advisories/24318 http://secunia.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 6%CPEs: 25EXPL: 1

The bgp_update_print function in tcpdump 3.x does not properly handle a -1 return value from the decode_prefix4 function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted BGP packet. • https://www.exploit-db.com/exploits/1037 http://secunia.com/advisories/15634 http://secunia.com/advisories/17118 http://www.debian.org/security/2005/dsa-854 http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html http://www.redhat.com/support/errata/RHSA-2005-505.html http://www.securityfocus.com/archive/1/430292/100/0/threaded http://www.securityfocus.com/bid/13906 http://www.trustix.org/errata/2005/0028 https://bugzilla.redhat.com/bugzilla/show& •