Bug 1490578 (CVE-2017-13011)
Summary: | CVE-2017-13011 tcpdump: Buffer overflow in util-print.c:bittok2str_internal() | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Adam Mariš <amaris> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | dmoppert, jsynacek, luhliari, mruprich, msehnout, msekleta, security-response-team, thozza |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | tcpdump 4.9.2 | Doc Type: | If docs needed, set a value |
Doc Text: |
A vulnerability was found in tcpdump's verbose printing of packet data. A crafted pcap file or specially crafted network traffic could cause tcpdump to write out of bounds in the BSS segment, potentially causing tcpdump to display truncated or incorrectly decoded fields or crash with a segmentation violation. This does not affect tcpdump when used with the -w option to save a pcap file.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-09-14 07:40:34 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1475364, 1490717, 1491082 | ||
Bug Blocks: | 1490633 |
Description
Adam Mariš
2017-09-11 21:52:24 UTC
Acknowledgments: Name: the Tcpdump project Created tcpdump tracking bugs for this issue: Affects: fedora-all [bug 1475364] This issue was addressed in Red Hat Enterprise Linux 7 via RHEA-2018:0705, which rebased tcpdump to 4.9.2: https://access.redhat.com/errata/RHEA-2018:0705 |