CVE-2014-9140

Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0511.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html
http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html
http://seclists.org/tcpdump/2014/q4/72
http://www.debian.org/security/2014/dsa-3086 Vendor Advisory
http://www.debian.org/security/2015/dsa-3193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.securityfocus.com/archive/1/534829/100/0/threaded
http://www.securityfocus.com/bid/71468
http://www.ubuntu.com/usn/USN-2433-1 Patch Vendor Advisory
https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c8668a120e048eda Exploit
https://support.apple.com/kb/HT205031
http://advisories.mageia.org/MGASA-2014-0511.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html
http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html
http://seclists.org/tcpdump/2014/q4/72
http://www.debian.org/security/2014/dsa-3086 Vendor Advisory
http://www.debian.org/security/2015/dsa-3193
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.securityfocus.com/archive/1/534829/100/0/threaded
http://www.securityfocus.com/bid/71468
http://www.ubuntu.com/usn/USN-2433-1 Patch Vendor Advisory
https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c8668a120e048eda Exploit
https://support.apple.com/kb/HT205031
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:tcpdump:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0511.html - () http://advisories.mageia.org/MGASA-2014-0511.html -
References () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html -
References () http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html - () http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html -
References () http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html - () http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html -
References () http://seclists.org/tcpdump/2014/q4/72 - () http://seclists.org/tcpdump/2014/q4/72 -
References () http://www.debian.org/security/2014/dsa-3086 - Vendor Advisory () http://www.debian.org/security/2014/dsa-3086 - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3193 - () http://www.debian.org/security/2015/dsa-3193 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 - () http://www.mandriva.com/security/advisories?name=MDVSA-2014:240 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:125 -
References () http://www.securityfocus.com/archive/1/534829/100/0/threaded - () http://www.securityfocus.com/archive/1/534829/100/0/threaded -
References () http://www.securityfocus.com/bid/71468 - () http://www.securityfocus.com/bid/71468 -
References () http://www.ubuntu.com/usn/USN-2433-1 - Patch, Vendor Advisory () http://www.ubuntu.com/usn/USN-2433-1 - Patch, Vendor Advisory
References () https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c8668a120e048eda - Exploit () https://github.com/the-tcpdump-group/tcpdump/commit/0f95d441e4b5d7512cc5c326c8668a120e048eda - Exploit
References () https://support.apple.com/kb/HT205031 - () https://support.apple.com/kb/HT205031 -

Information

Published : 2014-12-05 16:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9140

Mitre link : CVE-2014-9140

CVE.ORG link : CVE-2014-9140


JSON object : View

Products Affected

redhat

  • tcpdump
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer