4.4
CVSSv2

CVE-2018-16301

Published: 03/10/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The command-line argument parser in tcpdump prior to 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump

Vendor Advisories

Debian Bug report logs - #941697 libpcap: CVE-2018-16301 CVE-2019-15165 Package: src:libpcap; Maintainer for src:libpcap is Romain Francoise <rfrancoise@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 3 Oct 2019 21:33:02 UTC Severity: important Tags: security, upstream Found in version ...
Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2019-12-10-3 macOS Catalina 10152, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra <! ...