tcpdump
Page content
- Author: vmiklos
- Vulnerable: 3.9.5-2
- Unaffected: 3.9.5-3terminus1
mu-b has reported a vulnerability in tcpdump, which potentially can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to the incorrect use of the return value of “snprintf()” in print-bgp.c. This can be exploited to cause a buffer overflow by sending specially crafted BGP packets. Successful exploitation may allow the execution of arbitrary code.
- Bug Tracker URL: http://bugs.frugalware.org/task/2270