Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

1 – 10 of 182 results


CVE-2024-2397

Medium priority
Not affected

Due to a bug in packet data buffers management, the PPP printer in tcpdump can enter an infinite loop when reading a crafted DLT_PPP_SERIAL .pcap savefile. This problem does not affect any tcpdump release, but it affected the git...

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Not affected Not affected Not affected Not affected Not affected
Show less packages

CVE-2023-1801

Medium priority
Not affected

The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Not affected Not affected Not affected Not affected
Show less packages

CVE-2020-8037

Low priority

Some fixes available 3 of 5

The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Not affected Not affected Fixed Fixed Fixed
Show less packages

CVE-2020-8036

Low priority
Not affected

The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Not affected Not affected Not affected Not affected
Show less packages

CVE-2019-15167

Medium priority

Some fixes available 3 of 4

The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 3, a different vulnerability than CVE-2018-14463.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Fixed Fixed
Show less packages

CVE-2019-15166

Medium priority

Some fixes available 3 of 4

lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Fixed Fixed
Show less packages

CVE-2018-16452

Medium priority

Some fixes available 3 of 4

The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Fixed Fixed
Show less packages

CVE-2018-16451

Medium priority

Some fixes available 3 of 4

The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Fixed Fixed
Show less packages

CVE-2018-16301

Low priority

Some fixes available 3 of 4

The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name...

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Not affected Not affected Fixed Fixed Fixed
Show less packages

CVE-2018-16300

Medium priority

Some fixes available 3 of 4

The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.

1 affected packages

tcpdump

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
tcpdump Fixed Fixed
Show less packages