The IKEv1 parser in tcpdump before 4.9.3 has a buffer over-read in print-isakmp.c:ikev1_n_print(). Upstream patch: https://github.com/the-tcpdump-group/tcpdump/commit/396e94ff55a80d554b1fe46bf107db1e91008d6c References: https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Created tcpdump tracking bugs for this issue: Affects: fedora-all [bug 1760626]
While printing a REPLAY-STATUS notify message used in IKEv1, function ikev1_n_print() in print-isakmp.c can read beyond the limits of the captured buffer, if there are not enough bytes in the buffer to read the 32bits value that indicates whether the replay detection is enabled or not. This may print memory data on the victim's screen or crash the tcpdump application.
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14469
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4760 https://access.redhat.com/errata/RHSA-2020:4760