漏洞信息详情
tcpdump 缓冲区错误漏洞
漏洞简介
tcpdump是Tcpdump团队的一套运行在命令行下的嗅探工具。该工具主要用于数据包分析和网络流量捕获等。
tcpdump 4.9.3之前版本中的BGP解析器的print-bgp.c文件中的‘bgp_capabilities_print()’函数存在缓冲区错误漏洞。远程攻击者可通过发送特制数据利用该漏洞导致应用程序崩溃。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
参考网址
来源:CONFIRM
链接:https://support.apple.com/kb/HT210788
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20200120-0001/
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4547
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2019/Dec/26
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
来源:CONFIRM
链接:https://github.com/the-tcpdump-group/tcpdump/commit/86326e880d31b328a151d45348c35220baa9a1ff
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Oct/28
来源:github.com
链接:https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Dec/23
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-20192674-1.html
来源:www.suse.com
链接:https://www.suse.com/support/update/announcement/2019/suse-su-201914191-1.html
来源:support.f5.com
链接:https://support.f5.com/csp/article/K44551633
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4252-2/
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4252-1/
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
来源:support.apple.com
链接:https://support.apple.com/kb/HT201222
来源:lists.debian.org
链接:https://lists.debian.org/debian-security-announce/2019/msg00199.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/tcpdump-multiple-vulnerabilities-30492
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2018-14881
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4094/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/154710/Slackware-Security-Advisory-tcpdump-Updates.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0864
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4632/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3814.2/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0289/
来源:support.apple.com
链接:https://support.apple.com/en-us/HT210788
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3814/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4244/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0692
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161546/Red-Hat-Security-Advisory-2020-5633-01.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/1169974
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.4513/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3885/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/161742/Red-Hat-Security-Advisory-2021-0799-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3840/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159874/Red-Hat-Security-Advisory-2020-4760-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160624/Red-Hat-Security-Advisory-2020-5605-01.html
受影响实体
暂无
补丁
- tcpdump 缓冲区错误漏洞的修复措施<!--2019-10-2-->
还没有评论,来说两句吧...