CVE-2018-16301Integer Overflow or Wraparound in Tcpdump Group Tcpdump

Severity
7.8HIGHNVD
EPSS
0.1%
top 80.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 24

Description

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDtcpdump/tcpdump< 4.99.0
CVEListV5the_tcpdump_group/tcpdumpunspecified4.99.0
Debiantcpdump/tcpdump< 4.99.0-1+3
Ubuntutcpdump/tcpdump< 4.9.3-0ubuntu0.18.04.2+2

🔴Vulnerability Details

5
GHSA
GHSA-h8wh-rj39-x373: libpcap before 12022-05-24
OSV
tcpdump vulnerabilities2022-04-11
OSV
tcpdump vulnerabilities2022-03-16
OSV
CVE-2018-16301: The command-line argument parser in tcpdump before 42019-10-03
CVEList
CVE-2018-16301: The command-line argument parser in tcpdump before 42019-10-03

📋Vendor Advisories

6
Ubuntu
tcpdump vulnerabilities2022-04-11
Ubuntu
tcpdump vulnerabilities2022-03-16
Apple
CVE-2018-16301: macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra2019-12-10
Microsoft
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesyste2019-10-08
Red Hat
tcpdump: Buffer overflow in the -F command line argument parser2019-09-30

💬Community

2
Bugzilla
CVE-2018-16301 tcpdump: Buffer overflow in the -F command line argument parser2019-10-10
Bugzilla
CVE-2018-16301 CVE-2019-15161 CVE-2019-15162 CVE-2019-15163 CVE-2019-15164 CVE-2019-15165 libpcap: various flaws [fedora-all]2019-10-10
CVE-2018-16301 — Integer Overflow or Wraparound | cvebase