Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tcpdump tcpdump vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-1801
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
Tcpdump Tcpdump 4.99.3
445
VMScore
CVE-2020-8036
The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.
Tcpdump Tcpdump 4.10.0
383
VMScore
CVE-2019-1010220
tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "pr...
Tcpdump Tcpdump 4.9.2
505
VMScore
CVE-2014-8768
Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 up to and including 4.6.2, when in verbose mode, allow remote malicious users to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Canonical Ubuntu Linux 14.10
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 12.04
Oracle Solaris 11.2
Redhat Tcpdump 4.6.2
Redhat Tcpdump 4.6.0
Redhat Tcpdump 4.6.1
Redhat Tcpdump 4.5.1
Redhat Tcpdump 4.5.2
Redhat Tcpdump 4.5.0
1 EDB exploit
409
VMScore
CVE-2003-0194
tcpdump does not properly drop privileges to the pcap user when starting up.
Redhat Tcpdump 3.6.3-3
Redhat Tcpdump 3.7.2-1
Redhat Tcpdump 3.4-39
Redhat Tcpdump 3.6.2-9
Redhat Tcpdump 3.6.2-12
Redhat Linux 7.1
Redhat Linux 7.3
Redhat Linux 9.0
Redhat Linux 7.2
Redhat Linux 8.0
445
VMScore
CVE-2015-3138
print-wb.c in tcpdump prior to 4.7.4 allows remote malicious users to cause a denial of service (segmentation fault and process crash).
Tcpdump Tcpdump
Opensuse Project Leap 42.1
Opensuse Leap 42.2
668
VMScore
CVE-2011-1935
pcap-linux.c in libpcap 1.1.1 before commit ea9432fabdf4b33cbc76d9437200e028f1c47c93 when snaplen is set may truncate packets, which might allow remote malicious users to send arbitrary data while avoiding detection via crafted packets.
Tcpdump Libpcap
668
VMScore
CVE-2002-1350
The BGP decoding routines in tcpdump 3.6.x prior to 3.7 do not properly copy data, which allows remote malicious users to cause a denial of service (application crash).
Lbl Tcpdump
668
VMScore
CVE-2002-0380
Buffer overflow in tcpdump 3.6.2 and previous versions allows remote malicious users to cause a denial of service and possibly execute arbitrary code via an NFS packet.
Lbl Tcpdump
445
VMScore
CVE-2019-15163
rpcapd/daemon.c in libpcap prior to 1.9.1 allows malicious users to cause a denial of service (NULL pointer dereference and daemon crash) if a crypt() call fails.
Tcpdump Libpcap
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
hard-coded
CVE-2024-27202
NULL pointer dereference
CVE-2024-28075
CVE-2024-33608
CVE-2024-28889
CVE-2024-34572
template injection
CVE-2024-34351
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »