Description
The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
Exploits (1)
References (17)
Core 17
Core References
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT210788
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Oct/28
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2019/dsa-4547
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
Vendor Advisory x_refsource_confirm
https://support.f5.com/csp/article/K51512510?utm_source=f5support&%3Butm_medium=RSS
Mailing List, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Dec/23
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Dec/26
Vendor Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200120-0001/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4252-2/
Vendor Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4252-1/
Scores
CVSS v3
7.0
EPSS
0.0052
EPSS Percentile
66.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (13)
apple/mac_os_x
< 10.15.2
debian/debian_linux
8.0
debian/debian_linux
9.0
debian/debian_linux
10.0
f5/traffix_signaling_delivery_controller
5.0.0 - 5.1.0
fedoraproject/fedora
29
fedoraproject/fedora
30
fedoraproject/fedora
31
opensuse/leap
15.0
opensuse/leap
15.1
... and 3 more
Published
Oct 03, 2019
Tracked Since
Feb 18, 2026