Vulnerability Details CVE-2018-16301
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 17.8%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 4.4
Products affected by CVE-2018-16301
-
cpe:2.3:a:tcpdump:tcpdump:3.5.1
-
cpe:2.3:a:tcpdump:tcpdump:3.5.2
-
cpe:2.3:a:tcpdump:tcpdump:3.6.1
-
cpe:2.3:a:tcpdump:tcpdump:3.6.2
-
cpe:2.3:a:tcpdump:tcpdump:3.6.3
-
cpe:2.3:a:tcpdump:tcpdump:3.7.1
-
cpe:2.3:a:tcpdump:tcpdump:3.7.2
-
cpe:2.3:a:tcpdump:tcpdump:3.8.1
-
cpe:2.3:a:tcpdump:tcpdump:3.8.2
-
cpe:2.3:a:tcpdump:tcpdump:3.8.3
-
cpe:2.3:a:tcpdump:tcpdump:3.9.1
-
cpe:2.3:a:tcpdump:tcpdump:3.9.2
-
cpe:2.3:a:tcpdump:tcpdump:3.9.3
-
cpe:2.3:a:tcpdump:tcpdump:3.9.5
-
cpe:2.3:a:tcpdump:tcpdump:3.9.6
-
cpe:2.3:a:tcpdump:tcpdump:3.9.7
-
cpe:2.3:a:tcpdump:tcpdump:3.9.8
-
cpe:2.3:a:tcpdump:tcpdump:4.0.0
-
cpe:2.3:a:tcpdump:tcpdump:4.1.0
-
cpe:2.3:a:tcpdump:tcpdump:4.1.1
-
cpe:2.3:a:tcpdump:tcpdump:4.10.0
-
cpe:2.3:a:tcpdump:tcpdump:4.2.1
-
cpe:2.3:a:tcpdump:tcpdump:4.3.0
-
cpe:2.3:a:tcpdump:tcpdump:4.4.0
-
cpe:2.3:a:tcpdump:tcpdump:4.5.0
-
cpe:2.3:a:tcpdump:tcpdump:4.5.1
-
cpe:2.3:a:tcpdump:tcpdump:4.6.0
-
cpe:2.3:a:tcpdump:tcpdump:4.6.1
-
cpe:2.3:a:tcpdump:tcpdump:4.7.0
-
cpe:2.3:a:tcpdump:tcpdump:4.7.2
-
cpe:2.3:a:tcpdump:tcpdump:4.7.3
-
cpe:2.3:a:tcpdump:tcpdump:4.7.4
-
cpe:2.3:a:tcpdump:tcpdump:4.8.0
-
cpe:2.3:a:tcpdump:tcpdump:4.8.1
-
cpe:2.3:a:tcpdump:tcpdump:4.9.0
-
cpe:2.3:a:tcpdump:tcpdump:4.9.1
-
cpe:2.3:a:tcpdump:tcpdump:4.9.2
-
cpe:2.3:a:tcpdump:tcpdump:4.9.3