tcpdump 4.9.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201709-23 | vendor advisory |
https://support.apple.com/HT208221 | |
http://www.debian.org/security/2017/dsa-3971 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1468504 | issue tracking third party advisory |
https://access.redhat.com/errata/RHEA-2018:0705 | vendor advisory |