CVE-2014-8769
20.11.2014, 17:50
tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.Enginsight
Vendor | Product | Version |
---|---|---|
redhat | tcpdump | 3.8.0 |
redhat | tcpdump | 3.8.2 |
redhat | tcpdump | 3.9.2 |
redhat | tcpdump | 3.9.3 |
redhat | tcpdump | 3.9.4 |
redhat | tcpdump | 3.9.5 |
redhat | tcpdump | 3.9.6 |
redhat | tcpdump | 3.9.7 |
redhat | tcpdump | 3.9.8 |
redhat | tcpdump | 4.0.0 |
redhat | tcpdump | 4.1.0 |
redhat | tcpdump | 4.1.1 |
redhat | tcpdump | 4.1.2 |
redhat | tcpdump | 4.2.1 |
redhat | tcpdump | 4.3.0 |
redhat | tcpdump | 4.3.1 |
redhat | tcpdump | 4.4.0 |
redhat | tcpdump | 4.5.0 |
redhat | tcpdump | 4.5.1 |
redhat | tcpdump | 4.5.2 |
redhat | tcpdump | 4.6.0 |
redhat | tcpdump | 4.6.1 |
redhat | tcpdump | 4.6.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References