tcpdump 3.8 up to and including 4.6.2 might allow remote malicious users to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat tcpdump 3.8.0 |
||
redhat tcpdump 3.8.2 |
||
redhat tcpdump 3.9.8 |
||
redhat tcpdump 4.0.0 |
||
redhat tcpdump 4.4.0 |
||
redhat tcpdump 4.5.0 |
||
redhat tcpdump 3.9.4 |
||
redhat tcpdump 3.9.5 |
||
redhat tcpdump 4.1.2 |
||
redhat tcpdump 4.2.1 |
||
redhat tcpdump 4.6.0 |
||
redhat tcpdump 4.6.1 |
||
redhat tcpdump 3.9.2 |
||
redhat tcpdump 3.9.3 |
||
redhat tcpdump 4.1.0 |
||
redhat tcpdump 4.1.1 |
||
redhat tcpdump 4.5.1 |
||
redhat tcpdump 4.5.2 |
||
redhat tcpdump 3.9.6 |
||
redhat tcpdump 3.9.7 |
||
redhat tcpdump 4.3.0 |
||
redhat tcpdump 4.3.1 |
||
redhat tcpdump 4.6.2 |