CVE-2014-8769

EUVD-2014-8600
tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
Affected Products (NVD)
VendorProductVersion
redhattcpdump
3.8.0
redhattcpdump
3.8.2
redhattcpdump
3.9.2
redhattcpdump
3.9.3
redhattcpdump
3.9.4
redhattcpdump
3.9.5
redhattcpdump
3.9.6
redhattcpdump
3.9.7
redhattcpdump
3.9.8
redhattcpdump
4.0.0
redhattcpdump
4.1.0
redhattcpdump
4.1.1
redhattcpdump
4.1.2
redhattcpdump
4.2.1
redhattcpdump
4.3.0
redhattcpdump
4.3.1
redhattcpdump
4.4.0
redhattcpdump
4.5.0
redhattcpdump
4.5.1
redhattcpdump
4.5.2
redhattcpdump
4.6.0
redhattcpdump
4.6.1
redhattcpdump
4.6.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tcpdump
bookworm
4.99.3-1
fixed
bullseye
4.99.0-2+deb11u1
fixed
sid
4.99.5-1
fixed
trixie
4.99.5-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tcpdump
lucid
Fixed 4.0.0-6ubuntu3.1
released
precise
Fixed 4.2.1-1ubuntu2.1
released
trusty
Fixed 4.5.1-2ubuntu1.1
released
utopic
Fixed 4.6.2-1ubuntu1.1
released
References