vendor:
tcpdump
by:
mu-b
8.8
CVSS
HIGH
Integer Underflow
191
CWE
Product Name: tcpdump
Affected Version From: 3.9.2006
Affected Version To: 3.9.2006
Patch Exists: YES
Related CWE: CVE-2007-3799
CPE: a:tcpdump_project:tcpdump:3.9.6
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0889/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0917/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0891/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0889/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0890/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0890/, https://www.rapid7.com/db/vulnerabilities/php-cve-2007-3799/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2007-3799/, https://www.rapid7.com/db/vulnerabilities/apple-osx-php-cve-2007-3799/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2007-3799/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2007-0888/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2007-0888/
Platforms Tested: Linux
2007
tcpdump Integer Underflow Vulnerability
The 'tcpdump' utility is prone to an integer-underflow vulnerability because it fails to bounds-check user-supplied input before copying it into an insufficiently sized memory buffer.An attacker can exploit this issue to execute arbitrary malicious code in the context of the user running the affected application. Failed exploit attempts will likely crash the affected application.
Mitigation:
Upgrade to tcpdump version 3.9.7 or later.Limit network access to trusted hosts and networks.Use network intrusion detection systems to monitor network traffic and detect any malicious activity.