CVE-2018-16301

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-16301
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16301.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-16301
Downstream
Related
Published
2019-10-03T16:15:12Z
Modified
2025-10-10T01:18:19.208993Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.

References

Affected packages

Git / github.com/the-tcpdump-group/tcpdump

Affected ranges

Type
GIT
Repo
https://github.com/the-tcpdump-group/tcpdump
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

tcpdump-3.*

tcpdump-3.5.1
tcpdump-3.6.1
tcpdump-3.7.1
tcpdump-3.8-bp

tcpdump-4.*

tcpdump-4.5.0
tcpdump-4.6.0
tcpdump-4.6.0-bp
tcpdump-4.7.0-bp
tcpdump-4.9.0-bp
tcpdump-4.99-bp
tcpdump-4.99.0-bp