CVE-2014-8767

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/47 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534011/100/0/threaded
http://www.securityfocus.com/bid/71150 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98765
https://support.apple.com/kb/HT205031
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/47 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534011/100/0/threaded
http://www.securityfocus.com/bid/71150 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98765
https://support.apple.com/kb/HT205031
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.2:*:*:*:*:*:*:*
OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0503.html - () http://advisories.mageia.org/MGASA-2014-0503.html -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html -
References () http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html - () http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html -
References () http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html - Exploit () http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html - Exploit
References () http://seclists.org/fulldisclosure/2014/Nov/47 - Exploit () http://seclists.org/fulldisclosure/2014/Nov/47 - Exploit
References () http://www.debian.org/security/2014/dsa-3086 - () http://www.debian.org/security/2014/dsa-3086 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 -
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html -
References () http://www.securityfocus.com/archive/1/534011/100/0/threaded - () http://www.securityfocus.com/archive/1/534011/100/0/threaded -
References () http://www.securityfocus.com/bid/71150 - Exploit () http://www.securityfocus.com/bid/71150 - Exploit
References () http://www.ubuntu.com/usn/USN-2433-1 - () http://www.ubuntu.com/usn/USN-2433-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/98765 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/98765 -
References () https://support.apple.com/kb/HT205031 - () https://support.apple.com/kb/HT205031 -

Information

Published : 2014-11-20 17:50

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8767

Mitre link : CVE-2014-8767

CVE.ORG link : CVE-2014-8767


JSON object : View

Products Affected

redhat

  • tcpdump

opensuse

  • opensuse
CWE
CWE-189

Numeric Errors