CVE-2014-8767

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/47 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534011/100/0/threaded
http://www.securityfocus.com/bid/71150 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98765
https://support.apple.com/kb/HT205031
http://advisories.mageia.org/MGASA-2014-0503.html
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
http://lists.opensuse.org/opensuse-updates/2015-02/msg00062.html
http://packetstormsecurity.com/files/129155/tcpdump-4.6.2-OSLR-Denial-Of-Service.html Exploit
http://seclists.org/fulldisclosure/2014/Nov/47 Exploit
http://www.debian.org/security/2014/dsa-3086
http://www.mandriva.com/security/advisories?name=MDVSA-2014:240
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
http://www.securityfocus.com/archive/1/534011/100/0/threaded
http://www.securityfocus.com/bid/71150 Exploit
http://www.ubuntu.com/usn/USN-2433-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/98765
https://support.apple.com/kb/HT205031
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:3.9.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redhat:tcpdump:4.6.2:*:*:*:*:*:*:*
OR cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2014-11-20 17:50

Updated : 2025-04-12 10:46


NVD link : CVE-2014-8767

Mitre link : CVE-2014-8767

CVE.ORG link : CVE-2014-8767


JSON object : View

Products Affected

opensuse

  • opensuse

redhat

  • tcpdump
CWE
CWE-189

Numeric Errors