Il parser BGP in tcpdump prima 4.9.3 permette il consumo di stack in stampa-bgp.c: bgp_attr_print () a causa della ricorsione illimitato. |
https://seclists.org/bugtraq/2019/Oct/28 https://seclists.org/bugtraq/2019/Dec/23 https://github.com/the-tcpdump-group/tcpdump/commit/af2cf04a9394c1a56227c2289ae8da262828294a https://security.netapp.com/advisory/ntap-20200120-0001/ https://support.apple.com/kb/HT210788 https://www.debian.org/security/2019/dsa-4547 https://lists.fedoraproject.org/archives/list/[email protected]/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/ https://lists.fedoraproject.org/archives/list/[email protected]/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/ https://lists.fedoraproject.org/archives/list/[email protected]/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/ http://seclists.org/fulldisclosure/2019/Dec/26 https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html https://usn.ubuntu.com/4252-1/ https://usn.ubuntu.com/4252-2/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16300 |
Vulnerabilità: CVE-2018-16300
