CVE-2014-8769
Published: 20 November 2014
tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
Priority
Status
Package | Release | Status |
---|---|---|
tcpdump Launchpad, Ubuntu, Debian |
lucid |
Released
(4.0.0-6ubuntu3.1)
|
precise |
Released
(4.2.1-1ubuntu2.1)
|
|
trusty |
Released
(4.5.1-2ubuntu1.1)
|
|
upstream |
Released
(4.6.2-2)
|
|
utopic |
Released
(4.6.2-1ubuntu1.1)
|
|
Patches: upstream: https://github.com/the-tcpdump-group/tcpdump/commit/ab4e52b94aac6cb729a5a695aa612d5ebda2ec3a upstream: https://github.com/the-tcpdump-group/tcpdump/commit/3e8a443c3671baa37ae7870f08fb9b4bf386fd24 upstream: https://github.com/the-tcpdump-group/tcpdump/commit/e302ff0e4a6bde6915bee1c89373aa14c823dd60 upstream: https://github.com/the-tcpdump-group/tcpdump/commit/54d2912c19240a1a1866ba1519889086868038c4 upstream: https://github.com/the-tcpdump-group/tcpdump/commit/3f5693a2bb783b1caa2a308e64ee34d167f36f05 |