Severity
7.0HIGH
EPSS
0.5%
top 33.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 24

Description

The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages5 packages

NVDtcpdump/tcpdump< 4.9.3
Debiantcpdump< 4.9.3-1+3
NVDapple/mac_os_x< 10.15.2
NVDopensuse/leap15.0, 15.1+1

Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 29, 30, 31, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-x5g3-55pg-9g4m: The command-line argument parser in tcpdump before 42022-05-24
CVEList
CVE-2018-14879: The command-line argument parser in tcpdump before 42019-10-03
OSV
CVE-2018-14879: The command-line argument parser in tcpdump before 42019-10-03

📋Vendor Advisories

5
Ubuntu
tcpdump vulnerabilities2020-01-27
Ubuntu
tcpdump vulnerabilities2020-01-27
Apple
CVE-2018-14879: macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra2019-12-10
Red Hat
tcpdump: Out of bounds read/write in in get_next_file() in tcpdump.c2019-10-02
Debian
CVE-2018-14879: tcpdump - The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow i...2018

💬Community

3
HackerOne
tcpdump: CVE-2018-14879 - buffer overflow in tcpdump.c:get_next_file()2020-02-13
Bugzilla
CVE-2018-10105 CVE-2018-14461 CVE-2018-14462 CVE-2018-14463 CVE-2018-14464 CVE-2018-14465 CVE-2018-14466 CVE-2018-14467 CVE-2018-14468 CVE-2018-14469 CVE-2018-14470 CVE-2018-14879 CVE-2018-14880 CVE-22019-10-11
Bugzilla
CVE-2018-14879 tcpdump: Out of bounds read/write in in get_next_file() in tcpdump.c2019-10-10