CVE-2014-8767CVE-2014-8767

Affected configuration(s):

cpe:/a:redhat:tcpdump:3.9.6
cpe:/a:redhat:tcpdump:3.9.7
cpe:/a:redhat:tcpdump:3.9.8
cpe:/a:redhat:tcpdump:4.0.0
cpe:/a:redhat:tcpdump:4.1.0
cpe:/a:redhat:tcpdump:4.1.1
cpe:/a:redhat:tcpdump:4.1.2
cpe:/a:redhat:tcpdump:4.2.1
cpe:/a:redhat:tcpdump:4.3.0
cpe:/a:redhat:tcpdump:4.3.1
cpe:/a:redhat:tcpdump:4.4.0
cpe:/a:redhat:tcpdump:4.5.0
cpe:/a:redhat:tcpdump:4.5.1
cpe:/a:redhat:tcpdump:4.5.2
cpe:/a:redhat:tcpdump:4.6.0
cpe:/a:redhat:tcpdump:4.6.1
cpe:/a:redhat:tcpdump:4.6.2

Date published: 2014-11-20T12:50:04.723-05:00

Date last modified: 2017-09-07T21:29:28.073-04:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://advisories.mageia.org/MGASA-2014-0503.html

Summary: Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.