CVE-2018-16451Out-of-bounds Read in Tcpdump

CWE-125Out-of-bounds Read9 documents8 sources
Severity
7.5HIGHNVD
EPSS
0.5%
top 35.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 3
Latest updateMay 24

Description

The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

debiandebian/tcpdump< tcpdump 4.9.3-1 (bookworm)
NVDtcpdump/tcpdump< 4.9.3
Debiantcpdump/tcpdump< 4.9.3-1+3
NVDapple/mac_os_x< 10.15.2
NVDopensuse/leap15.0, 15.1+1

Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 29, 30, 31, Enterprise Linux 7.0, 8.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q5wq-8g35-qxj4: The SMB parser in tcpdump before 42022-05-24
OSV
CVE-2018-16451: The SMB parser in tcpdump before 42019-10-03

📋Vendor Advisories

5
Ubuntu
tcpdump vulnerabilities2020-01-27
Ubuntu
tcpdump vulnerabilities2020-01-27
Apple
CVE-2018-16451: macOS Catalina 10.15.2, Security Update 2019-002 Mojave, Security Update 2019-007 High Sierra2019-12-10
Red Hat
tcpdump: Buffer over-read in print_trans() function in print-smb.c2019-10-02
Debian
CVE-2018-16451: tcpdump - The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:prin...2018

💬Community

1
Bugzilla
CVE-2018-16451 tcpdump: Buffer over-read in print_trans() function in print-smb.c2019-10-10