Vulnerability identifier: #VU6810
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-120
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Tcpdump
Server applications /
DLP, anti-spam, sniffers
Vendor: Tcpdump.org
Description
The vulnerability allow a remote attacker to cause DoS condition or potentially execute arbitrary code on the target syste.
The weakness exists due to buffer overflow in the print-geonet.c in the GeoNetworking parser. A remote attacker can use a specially crafted protocol to trigger memory corruption and cause the application to crash or possibly execute arbitrary code.
Successful exploitation of the vulnerability may result system compromise.
Mitigation
Update to version 4.9.0.
Vulnerable software versions
Tcpdump: 3.6.2 - 4.8.1
External links
https://isc.sans.edu/forums/diary/Multiple+Vulnerabilities+in+tcpdump/22017/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.