Off-by-one buffer overflow in the parse_elements function in the 802.11 printer code (print-802_11.c) for tcpdump 3.9.5 and earlier allows remote attackers to cause a denial of service (crash) via a crafted 802.11 frame. NOTE: this was originally referred to as heap-based, but it might be stack-based.
References
Configurations
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c - | |
References | () http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.31.2.11&r2=1.31.2.12 - | |
References | () http://docs.info.apple.com/article.html?artnum=307179 - | |
References | () http://fedoranews.org/cms/node/2798 - | |
References | () http://fedoranews.org/cms/node/2799 - | |
References | () http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html - | |
References | () http://seclists.org/fulldisclosure/2007/Mar/0003.html - | |
References | () http://secunia.com/advisories/24318 - Vendor Advisory | |
References | () http://secunia.com/advisories/24354 - Vendor Advisory | |
References | () http://secunia.com/advisories/24423 - Vendor Advisory | |
References | () http://secunia.com/advisories/24451 - Vendor Advisory | |
References | () http://secunia.com/advisories/24583 - Vendor Advisory | |
References | () http://secunia.com/advisories/24610 - Vendor Advisory | |
References | () http://secunia.com/advisories/27580 - Vendor Advisory | |
References | () http://secunia.com/advisories/28136 - Vendor Advisory | |
References | () http://www.debian.org/security/2007/dsa-1272 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:056 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:155 - | |
References | () http://www.osvdb.org/32427 - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0368.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0387.html - | |
References | () http://www.securityfocus.com/bid/22772 - | |
References | () http://www.securitytracker.com/id?1017717 - | |
References | () http://www.turbolinux.com/security/2007/TLSA-2007-46.txt - | |
References | () http://www.ubuntu.com/usn/usn-429-1 - | |
References | () http://www.us-cert.gov/cas/techalerts/TA07-352A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2007/0793 - | |
References | () http://www.vupen.com/english/advisories/2007/4238 - | |
References | () https://bugs.gentoo.org/show_bug.cgi?id=168916 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32749 - | |
References | () https://issues.rpath.com/browse/RPL-1100 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9520 - |
Information
Published : 2007-03-02 21:18
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1218
Mitre link : CVE-2007-1218
CVE.ORG link : CVE-2007-1218
JSON object : View
Products Affected
tcpdump
- tcpdump