Integer underflow in the olsr_print function in tcpdump 3.9.6 up to and including 4.6.2, when in verbose mode, allows remote malicious users to cause a denial of service (crash) via a crafted length value in an OLSR frame.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat tcpdump 4.6.1 |
||
redhat tcpdump 4.6.0 |
||
redhat tcpdump 4.2.1 |
||
redhat tcpdump 4.1.2 |
||
redhat tcpdump 4.5.0 |
||
redhat tcpdump 4.4.0 |
||
redhat tcpdump 3.9.8 |
||
redhat tcpdump 3.9.7 |
||
redhat tcpdump 4.6.2 |
||
redhat tcpdump 4.3.1 |
||
redhat tcpdump 4.3.0 |
||
redhat tcpdump 3.9.6 |
||
redhat tcpdump 4.5.2 |
||
redhat tcpdump 4.5.1 |
||
redhat tcpdump 4.1.1 |
||
redhat tcpdump 4.1.0 |
||
redhat tcpdump 4.0.0 |