CVE-2018-16451

Name
CVE-2018-16451
Description
The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Patch https://github.com/the-tcpdump-group/tcpdump/commit/96480ab95308cd9234b4f09b175ebf60e17792c6
Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
Mailing List https://seclists.org/bugtraq/2019/Oct/28
Third Party Advisory https://www.debian.org/security/2019/dsa-4547
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
Third Party Advisory https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
Third Party Advisory https://support.apple.com/kb/HT210788
Mailing List https://seclists.org/bugtraq/2019/Dec/23
Mailing List http://seclists.org/fulldisclosure/2019/Dec/26
CONFIRM https://security.netapp.com/advisory/ntap-20200120-0001/
UBUNTU https://usn.ubuntu.com/4252-2/
UBUNTU https://usn.ubuntu.com/4252-1/
cve@mitre.org https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
cve@mitre.org https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
cve@mitre.org https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:* tcpdump >= None < 4.9.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
tcpdump edge-main 4.9.3-r0 None fixed
tcpdump edge-main 4.9.1-r0 None possibly vulnerable
tcpdump edge-main 4.9.0-r0 None possibly vulnerable
tcpdump 3.22-main 4.9.3-r0 None fixed
tcpdump 3.22-main 4.9.1-r0 None possibly vulnerable
tcpdump 3.22-main 4.9.0-r0 None possibly vulnerable
tcpdump 3.21-main 4.9.3-r0 None fixed
tcpdump 3.21-main 4.9.1-r0 None possibly vulnerable
tcpdump 3.21-main 4.9.0-r0 None possibly vulnerable
tcpdump 3.20-main 4.9.3-r0 None fixed
tcpdump 3.20-main 4.9.1-r0 None possibly vulnerable
tcpdump 3.20-main 4.9.0-r0 None possibly vulnerable
tcpdump 3.19-main 4.9.3-r0 None fixed
tcpdump 3.19-main 4.9.1-r0 None possibly vulnerable
tcpdump 3.19-main 4.9.0-r0 None possibly vulnerable
tcpdump 3.18-main 4.9.3-r0 None fixed
tcpdump 3.17-main 4.9.3-r0 None fixed
tcpdump 3.12-main 4.9.3-r0 None fixed
tcpdump 3.11-main 4.9.3-r0 None fixed
tcpdump 3.10-main 4.9.3-r0 None fixed