Download
| Alert*
oval:org.secpod.oval:def:503458
The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix: * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix via crafted pcap ... oval:org.secpod.oval:def:66776 The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix: * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix via crafted pcap ... oval:org.secpod.oval:def:89002274 This update for tcpdump fixes the following issues: Security issues fixed: - CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function oval:org.secpod.oval:def:61794 tcpdump: command-line network traffic analyzer Several security issues were fixed in tcpdump. oval:org.secpod.oval:def:705352 tcpdump: command-line network traffic analyzer Several security issues were fixed in tcpdump. oval:org.secpod.oval:def:205394 The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix: * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix via crafted pcap ... oval:org.secpod.oval:def:2104637 tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: "ND_PRINT((ndo, "%s", buf));", in function named "print_prefix", in "print-hncp.c". The attack vector is: The victim must open ... oval:org.secpod.oval:def:69491 The tcpdump packages contain the tcpdump utility for monitoring network traffic. The tcpdump utility can capture and display the packet headers on a particular network interface or on all interfaces. Security Fix: * tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix via crafted pcap ... oval:org.secpod.oval:def:89049774 This update for tcpdump fixes the following issues: Security issues fixed: - CVE-2018-19519: Fixed a stack-based buffer over-read in the print_prefix function oval:org.secpod.oval:def:1504115 [14:4.9.2-6] - Resolves: #1715423 - tcpdump pre creates user and groups unconditionally - Resolves: #1655622 - CVE-2018-19519 Stack-based buffer over-read in print-hncp.c:print_prefix via crafted pcap oval:org.secpod.oval:def:1502736 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:1700296 In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization oval:org.secpod.oval:def:2001124 In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization. oval:org.secpod.oval:def:1100535 The remote host is missing a patch containing a security fix, which affects the following packages: bos.net.tcp.server. For more information please visit vendor advisory link. |