CVE-2015-0261
Published: 24 March 2015
Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
Priority
Status
Package | Release | Status |
---|---|---|
tcpdump Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(4.2.1-1ubuntu2.2)
|
|
trusty |
Released
(4.5.1-2ubuntu1.2)
|
|
upstream |
Released
(4.7.2)
|
|
utopic |
Released
(4.6.2-1ubuntu1.2)
|
|
vivid |
Not vulnerable
(4.6.2-4ubuntu1)
|
|
Patches: upstream: https://github.com/the-tcpdump-group/tcpdump/commit/192fabf4bd08e17b4be6f0283508b19adfa08afb upstream: https://github.com/the-tcpdump-group/tcpdump/commit/beec87b5164e97349d50cb93c02dc7f05dfa3a03 upstream: http://www.ca.tcpdump.org/cve/0001-in-some-cases-we-expect-tcpdump-to-fail-with-an-erro.patch upstream: http://www.ca.tcpdump.org/cve/0002-test-case-files-for-CVE-2015-2153-2154-2155.patch upstream: http://www.ca.tcpdump.org/cve/0003-test-case-for-cve2015-0261-corrupted-IPv6-mobility-h.patch |
||
This vulnerability is mitigated in part by an AppArmor profile. |