CVE-2018-14466Out-of-bounds Read in Tcpdump

CWE-125Out-of-bounds Read13 documents8 sources
Severity
7.5HIGHNVD
OSV6.1
EPSS
0.5%
top 36.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 24

Description

The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_cache_find() and rx_cache_insert().

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

debiandebian/tcpdump< tcpdump 4.9.3-1 (bookworm)
NVDtcpdump/tcpdump< 4.9.3
Debiantcpdump/tcpdump< 4.9.3-1+3
NVDapple/mac_os_x< 10.15.2
Ubuntugosa_project/gosa< 2.7.4+reloaded2-9ubuntu1.1

Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 29, 30, 31, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7g55-mpv3-vx92: The Rx parser in tcpdump before 42022-05-24
OSV
gosa vulnerabilities2020-10-28
OSV
CVE-2018-14466: The Rx parser in tcpdump before 42019-10-03

📋Vendor Advisories

5
Ubuntu
tcpdump vulnerabilities2020-01-27
Ubuntu
tcpdump vulnerabilities2020-01-27
Apple
CVE-2018-14466: macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra2019-12-10
Red Hat
tcpdump: Buffer over-read in print-icmp6.c2019-10-02
Debian
CVE-2018-14466: tcpdump - The Rx parser in tcpdump before 4.9.3 has a buffer over-read in print-rx.c:rx_ca...2018

💬Community

4
Bugzilla
tcpdump: heap-based buffer over-read in the EXTRACT_32BITS function due to improper serviceId sanitization2020-03-26
Bugzilla
CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-22019-10-11
Bugzilla
CVE-2018-14466 tcpdump: Buffer over-read in print-icmp6.c2019-10-10
Bugzilla
CVE-2018-19625 wireshark: Heap-based buffer over-read in the dissection engine2018-12-04