Integer underflow vulnerability in the olsr_print function in tcpdump
|ID: oval:org.secpod.oval:def:24740||Date: (C)2015-06-08 (M)2017-09-11|
|Class: VULNERABILITY||Family: unix|
The host is installed with tcpdump in RHEL 5, 6 or 7 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted length value in an OLSR frame. Successful exploitation could allow attackers to crash the service.
|Red Hat Enterprise Linux 5|
|Red Hat Enterprise Linux 6|
|Red Hat Enterprise Linux 7|