vendor:
TcpDump
by:
Luke Arntson
7.5
CVSS
HIGH
Out-of-Bounds Denial of Service
119
CWE
Product Name: TcpDump
Affected Version From: 4.4.2000
Affected Version To: 4.6.2002
Patch Exists: YES
Related CWE: CVE-2015-2153
CPE: a:tcpdump:tcpdump
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2015-2153/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2015-2153/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Lubuntu 14.04 64-bit
2015
TcpDump rpki_rtr_pdu_print Out-of-Bounds Denial of Service
TcpDump rpki_rtr_pdu_print Out-of-Bounds Denial of Service vulnerability allows an attacker to cause a denial of service (DoS) by sending a specially crafted packet to the target system. This vulnerability affects versions 4.6.2, 4.5.1, and 4.4.0 of TcpDump. The vulnerability can be triggered by sending a packet with a spoofed source IP address to the target system. The packet must be sent in verbose mode for the DoS to be triggered.
Mitigation:
Upgrade to the latest version of TcpDump to mitigate this vulnerability.