Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2014-8767

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.065
EPSS Ranking 90.7%
CVSS Severity
CVSS v2 Score 5.0
References
Products affected by CVE-2014-8767
  • Redhat » Tcpdump » Version: 3.9.6
    cpe:2.3:a:redhat:tcpdump:3.9.6
  • Redhat » Tcpdump » Version: 3.9.7
    cpe:2.3:a:redhat:tcpdump:3.9.7
  • Redhat » Tcpdump » Version: 3.9.8
    cpe:2.3:a:redhat:tcpdump:3.9.8
  • Redhat » Tcpdump » Version: 4.0.0
    cpe:2.3:a:redhat:tcpdump:4.0.0
  • Redhat » Tcpdump » Version: 4.1.0
    cpe:2.3:a:redhat:tcpdump:4.1.0
  • Redhat » Tcpdump » Version: 4.1.1
    cpe:2.3:a:redhat:tcpdump:4.1.1
  • Redhat » Tcpdump » Version: 4.1.2
    cpe:2.3:a:redhat:tcpdump:4.1.2
  • Redhat » Tcpdump » Version: 4.2.1
    cpe:2.3:a:redhat:tcpdump:4.2.1
  • Redhat » Tcpdump » Version: 4.3.0
    cpe:2.3:a:redhat:tcpdump:4.3.0
  • Redhat » Tcpdump » Version: 4.3.1
    cpe:2.3:a:redhat:tcpdump:4.3.1
  • Redhat » Tcpdump » Version: 4.4.0
    cpe:2.3:a:redhat:tcpdump:4.4.0
  • Redhat » Tcpdump » Version: 4.5.0
    cpe:2.3:a:redhat:tcpdump:4.5.0
  • Redhat » Tcpdump » Version: 4.5.1
    cpe:2.3:a:redhat:tcpdump:4.5.1
  • Redhat » Tcpdump » Version: 4.5.2
    cpe:2.3:a:redhat:tcpdump:4.5.2
  • Redhat » Tcpdump » Version: 4.6.0
    cpe:2.3:a:redhat:tcpdump:4.6.0
  • Redhat » Tcpdump » Version: 4.6.1
    cpe:2.3:a:redhat:tcpdump:4.6.1
  • Redhat » Tcpdump » Version: 4.6.2
    cpe:2.3:a:redhat:tcpdump:4.6.2
  • Opensuse » Opensuse » Version: 13.1
    cpe:2.3:o:opensuse:opensuse:13.1
  • Opensuse » Opensuse » Version: 13.2
    cpe:2.3:o:opensuse:opensuse:13.2


Contact Us

Shodan ® - All rights reserved