CVE-2018-16230
Published: August 31, 2023Last modified: August 31, 2023
Description
The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).
Severity score breakdown
| Parameter | Value | 
|---|---|
| Base score | 7.5 | 
| Attack Vector | NETWORK | 
| Attack complexity | LOW | 
| Privileges required | NONE | 
| User interaction | NONE | 
| Scope | UNCHANGED | 
| Confidentiality | NONE | 
| Integrity impact | NONE | 
| Availability impact | HIGH | 
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 
Status
| Product | Release | Package | Status | 
|---|---|---|---|
| Alpaquita Linux | 23 LTS | tcpdump | Not affected (4.99.4-r0) | 
| Stream | tcpdump | Not affected (4.99.4-r1) | 
References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
 - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
 - http://seclists.org/fulldisclosure/2019/Dec/26
 - https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
 - https://github.com/the-tcpdump-group/tcpdump/commit/13d52e9c0e7caf7e6325b0051bc90a49968be67f
 - https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
 - https://lists.fedoraproject.org/archives/list/[email protected]/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
 - https://lists.fedoraproject.org/archives/list/[email protected]/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
 - https://lists.fedoraproject.org/archives/list/[email protected]/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
 - https://seclists.org/bugtraq/2019/Dec/23
 - https://seclists.org/bugtraq/2019/Oct/28
 - https://security.netapp.com/advisory/ntap-20200120-0001/
 - https://support.apple.com/kb/HT210788
 - https://usn.ubuntu.com/4252-1/
 - https://usn.ubuntu.com/4252-2/
 - https://www.debian.org/security/2019/dsa-4547