The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apple
Subscribe
|
Mac Os X
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
F5
Subscribe
|
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Fraud Protection Service
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Big-iq Centralized Management
Subscribe
Enterprise Manager
Subscribe
Iworkflow
Subscribe
Traffix Signaling Delivery Controller
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
|
Tcpdump
Subscribe
|
Tcpdump
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1955-1 | tcpdump security update |
Debian DSA |
DSA-4547-1 | tcpdump security update |
EUVD |
EUVD-2018-6762 | The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr(). |
Ubuntu USN |
USN-4252-1 | tcpdump vulnerabilities |
Ubuntu USN |
USN-4252-2 | tcpdump vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:46:23.859Z
Reserved: 2018-08-03T00:00:00
Link: CVE-2018-14880
No data.
Status : Modified
Published: 2019-10-03T16:15:12.210
Modified: 2024-11-21T03:49:59.753
Link: CVE-2018-14880
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN