CVE-2018-16301 PUBLISHED

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

EPSS 0.06% · 19.8th percentile

Risk Scores

EPSS Score
0.06%
19.8th percentile

Affected Products

VendorProductVersions
Ubuntu:20.04:LTStcpdump4.9.3-4, 4.9.3-3, 4.9.3-2
Ubuntu:Pro:14.04:LTStcpdump4.5.1-2ubuntu1.2, 4.9.0-1ubuntu1~ubuntu14.04.1, 4.9.2-0ubuntu0.14.04.1
Ubuntu:18.04:LTStcpdump4.9.3-0ubuntu0.18.04.1, 0, 4.9.2-1
Ubuntu:Pro:16.04:LTStcpdump0, 4.9.2-0ubuntu0.16.04.1, 4.9.0-1ubuntu1~ubuntu16.04.1

Timeline

References

Open in Interactive Console →