CVE-2014-8769

tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/49 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534009/100/0/threaded
http://www.securityfocus.com/bid/71153 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98764
https://support.apple.com/kb/HT205031
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/49 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534009/100/0/threaded
http://www.securityfocus.com/bid/71153 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98764
https://support.apple.com/kb/HT205031
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:tcpdump:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.5:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.2:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0503.html - () http://advisories.mageia.org/MGASA-2014-0503.html -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html -
References () http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html - () http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html -
References () http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html - Exploit () http://packetstormsecurity.com/files/129157/tcpdump-4.6.2-AOVD-Unreliable-Output.html - Exploit
References () http://seclists.org/fulldisclosure/2014/Nov/49 - Exploit () http://seclists.org/fulldisclosure/2014/Nov/49 - Exploit
References () http://www.debian.org/security/2014/dsa-3086 - () http://www.debian.org/security/2014/dsa-3086 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 -
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html -
References () http://www.securityfocus.com/archive/1/534009/100/0/threaded - () http://www.securityfocus.com/archive/1/534009/100/0/threaded -
References () http://www.securityfocus.com/bid/71153 - Exploit () http://www.securityfocus.com/bid/71153 - Exploit
References () http://www.ubuntu.com/usn/USN-2433-1 - () http://www.ubuntu.com/usn/USN-2433-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/98764 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/98764 -
References () https://support.apple.com/kb/HT205031 - () https://support.apple.com/kb/HT205031 -

Information

Published : 2014-11-20 17:50

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8769

Mitre link : CVE-2014-8769

CVE.ORG link : CVE-2014-8769


JSON object : View

Products Affected

redhat

  • tcpdump
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer