Vulnerability Description
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tcpdump | Tcpdump | < 4.99.0 |
Related Weaknesses (CWE)
References
- https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e9037
- https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e9037
FAQ
What is CVE-2018-16301?
CVE-2018-16301 is a vulnerability with a CVSS score of 7.8 (HIGH). The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesyste...
How severe is CVE-2018-16301?
CVE-2018-16301 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16301?
Check the references section above for vendor advisories and patch information. Affected products include: Tcpdump Tcpdump.