Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-16452
The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.012
EPSS Ranking
78.1%
CVSS Severity
CVSS v3 Score
7.5
CVSS v2 Score
5.0
References
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
http://seclists.org/fulldisclosure/2019/Dec/26
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Oct/28
https://security.netapp.com/advisory/ntap-20200120-0001/
https://support.apple.com/kb/HT210788
https://usn.ubuntu.com/4252-1/
https://usn.ubuntu.com/4252-2/
https://www.debian.org/security/2019/dsa-4547
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
http://seclists.org/fulldisclosure/2019/Dec/26
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
https://github.com/the-tcpdump-group/tcpdump/commit/24182d959f661327525a20d9a94c98a8ec016778
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Oct/28
https://security.netapp.com/advisory/ntap-20200120-0001/
https://support.apple.com/kb/HT210788
https://usn.ubuntu.com/4252-1/
https://usn.ubuntu.com/4252-2/
https://www.debian.org/security/2019/dsa-4547
Products affected by CVE-2018-16452
Tcpdump
»
Tcpdump
»
Version:
3.5.1
cpe:2.3:a:tcpdump:tcpdump:3.5.1
Tcpdump
»
Tcpdump
»
Version:
3.5.2
cpe:2.3:a:tcpdump:tcpdump:3.5.2
Tcpdump
»
Tcpdump
»
Version:
3.6.1
cpe:2.3:a:tcpdump:tcpdump:3.6.1
Tcpdump
»
Tcpdump
»
Version:
3.6.2
cpe:2.3:a:tcpdump:tcpdump:3.6.2
Tcpdump
»
Tcpdump
»
Version:
3.6.3
cpe:2.3:a:tcpdump:tcpdump:3.6.3
Tcpdump
»
Tcpdump
»
Version:
3.7.1
cpe:2.3:a:tcpdump:tcpdump:3.7.1
Tcpdump
»
Tcpdump
»
Version:
3.7.2
cpe:2.3:a:tcpdump:tcpdump:3.7.2
Tcpdump
»
Tcpdump
»
Version:
3.8.1
cpe:2.3:a:tcpdump:tcpdump:3.8.1
Tcpdump
»
Tcpdump
»
Version:
3.8.2
cpe:2.3:a:tcpdump:tcpdump:3.8.2
Tcpdump
»
Tcpdump
»
Version:
3.8.3
cpe:2.3:a:tcpdump:tcpdump:3.8.3
Tcpdump
»
Tcpdump
»
Version:
3.9.1
cpe:2.3:a:tcpdump:tcpdump:3.9.1
Tcpdump
»
Tcpdump
»
Version:
3.9.2
cpe:2.3:a:tcpdump:tcpdump:3.9.2
Tcpdump
»
Tcpdump
»
Version:
3.9.3
cpe:2.3:a:tcpdump:tcpdump:3.9.3
Tcpdump
»
Tcpdump
»
Version:
3.9.5
cpe:2.3:a:tcpdump:tcpdump:3.9.5
Tcpdump
»
Tcpdump
»
Version:
3.9.6
cpe:2.3:a:tcpdump:tcpdump:3.9.6
Tcpdump
»
Tcpdump
»
Version:
3.9.7
cpe:2.3:a:tcpdump:tcpdump:3.9.7
Tcpdump
»
Tcpdump
»
Version:
3.9.8
cpe:2.3:a:tcpdump:tcpdump:3.9.8
Tcpdump
»
Tcpdump
»
Version:
4.0.0
cpe:2.3:a:tcpdump:tcpdump:4.0.0
Tcpdump
»
Tcpdump
»
Version:
4.1.0
cpe:2.3:a:tcpdump:tcpdump:4.1.0
Tcpdump
»
Tcpdump
»
Version:
4.1.1
cpe:2.3:a:tcpdump:tcpdump:4.1.1
Tcpdump
»
Tcpdump
»
Version:
4.2.1
cpe:2.3:a:tcpdump:tcpdump:4.2.1
Tcpdump
»
Tcpdump
»
Version:
4.3.0
cpe:2.3:a:tcpdump:tcpdump:4.3.0
Tcpdump
»
Tcpdump
»
Version:
4.4.0
cpe:2.3:a:tcpdump:tcpdump:4.4.0
Tcpdump
»
Tcpdump
»
Version:
4.5.0
cpe:2.3:a:tcpdump:tcpdump:4.5.0
Tcpdump
»
Tcpdump
»
Version:
4.5.1
cpe:2.3:a:tcpdump:tcpdump:4.5.1
Tcpdump
»
Tcpdump
»
Version:
4.6.0
cpe:2.3:a:tcpdump:tcpdump:4.6.0
Tcpdump
»
Tcpdump
»
Version:
4.6.1
cpe:2.3:a:tcpdump:tcpdump:4.6.1
Tcpdump
»
Tcpdump
»
Version:
4.7.0
cpe:2.3:a:tcpdump:tcpdump:4.7.0
Tcpdump
»
Tcpdump
»
Version:
4.7.2
cpe:2.3:a:tcpdump:tcpdump:4.7.2
Tcpdump
»
Tcpdump
»
Version:
4.7.3
cpe:2.3:a:tcpdump:tcpdump:4.7.3
Tcpdump
»
Tcpdump
»
Version:
4.7.4
cpe:2.3:a:tcpdump:tcpdump:4.7.4
Tcpdump
»
Tcpdump
»
Version:
4.8.0
cpe:2.3:a:tcpdump:tcpdump:4.8.0
Tcpdump
»
Tcpdump
»
Version:
4.8.1
cpe:2.3:a:tcpdump:tcpdump:4.8.1
Tcpdump
»
Tcpdump
»
Version:
4.9.0
cpe:2.3:a:tcpdump:tcpdump:4.9.0
Tcpdump
»
Tcpdump
»
Version:
4.9.1
cpe:2.3:a:tcpdump:tcpdump:4.9.1
Tcpdump
»
Tcpdump
»
Version:
4.9.2
cpe:2.3:a:tcpdump:tcpdump:4.9.2
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved