Bug 1760457 (CVE-2018-14879) - CVE-2018-14879 tcpdump: Buffer overflow in get_next_file() in tcpdump.c
Summary: CVE-2018-14879 tcpdump: Buffer overflow in get_next_file() in tcpdump.c
Keywords:
Status: NEW
Alias: CVE-2018-14879
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1760626
Blocks: 1760628
TreeView+ depends on / blocked
 
Reported: 2019-10-10 15:09 UTC by Pedro Sampaio
Modified: 2019-10-11 13:40 UTC (History)
6 users (show)

Fixed In Version: tcpdump 4.9.3
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Pedro Sampaio 2019-10-10 15:09:33 UTC
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().

Upstream patch:

https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6

References:

https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES

Comment 1 Pedro Sampaio 2019-10-11 00:01:46 UTC
Created tcpdump tracking bugs for this issue:

Affects: fedora-all [bug 1760626]


Note You need to log in before you can comment on or make changes to this bug.