4.3
CVSSv2

CVE-2019-1010220

Published: 22/07/2019 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open a specially crafted pcap file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump 4.9.2

Vendor Advisories

Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...
Impact: Moderate Public Date: 2019-08-01 CWE: CWE-125 Bugzilla: 1735549: CVE-2019-1010220 tcpdump: buff ...