CVE-2015-2153
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
24/03/2015
Last modified:
12/04/2025
Description
The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:* | 4.7.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2015-0114.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153999.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html
- http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html
- http://www.debian.org/security/2015/dsa-3193
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A182
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/archive/1/534829/100/0/threaded
- http://www.securityfocus.com/bid/73018
- http://www.securitytracker.com/id/1031937
- http://www.ubuntu.com/usn/USN-2580-1
- https://access.redhat.com/errata/RHSA-2017:1871
- https://bugzilla.redhat.com/show_bug.cgi?id=1201795
- https://security.gentoo.org/glsa/201510-04
- https://www.exploit-db.com/exploits/37663/
- http://advisories.mageia.org/MGASA-2015-0114.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153999.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.html
- http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.html
- http://www.debian.org/security/2015/dsa-3193
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A125
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A182
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securityfocus.com/archive/1/534829/100/0/threaded
- http://www.securityfocus.com/bid/73018
- http://www.securitytracker.com/id/1031937
- http://www.ubuntu.com/usn/USN-2580-1
- https://access.redhat.com/errata/RHSA-2017:1871
- https://bugzilla.redhat.com/show_bug.cgi?id=1201795
- https://security.gentoo.org/glsa/201510-04
- https://www.exploit-db.com/exploits/37663/



