Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-8767


Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.


Published

2014-11-20T17:50:04.723

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-189

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application redhat tcpdump 3.9.6 Yes
Application redhat tcpdump 3.9.7 Yes
Application redhat tcpdump 3.9.8 Yes
Application redhat tcpdump 4.0.0 Yes
Application redhat tcpdump 4.1.0 Yes
Application redhat tcpdump 4.1.1 Yes
Application redhat tcpdump 4.1.2 Yes
Application redhat tcpdump 4.2.1 Yes
Application redhat tcpdump 4.3.0 Yes
Application redhat tcpdump 4.3.1 Yes
Application redhat tcpdump 4.4.0 Yes
Application redhat tcpdump 4.5.0 Yes
Application redhat tcpdump 4.5.1 Yes
Application redhat tcpdump 4.5.2 Yes
Application redhat tcpdump 4.6.0 Yes
Application redhat tcpdump 4.6.1 Yes
Application redhat tcpdump 4.6.2 Yes
Operating System opensuse opensuse 13.1 No
Operating System opensuse opensuse 13.2 No

References