The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of tcpdump: out-of-bounds memory reading

Synthesis of the vulnerability

An attacker can force a read at an invalid address of tcpdump, in order to trigger a denial of service, or to obtain sensitive information.
Severity of this computer vulnerability: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 30/09/2019.
Références of this announce: CVE-2019-15166, CVE-2019-15167, DLA-1955-1, DSA-4547-1, FEDORA-2019-6db0d5b9d9, FEDORA-2019-85d92df70f, FEDORA-2019-d06bc63433, HT210788, K04367730, K44551633, K56551263, K86252029, openSUSE-SU-2019:2344-1, openSUSE-SU-2019:2348-1, PROJ-ZERO-1724, SSA:2019-274-01, SUSE-SU-2019:14191-1, SUSE-SU-2019:2674-1, VIGILANCE-VUL-30472.

Description of the vulnerability

An attacker can force a read at an invalid address of tcpdump, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

This threat bulletin impacts software or systems such as Mac OS X, Debian, BIG-IP Hardware, TMOS, Fedora, openSUSE Leap, Slackware, SUSE Linux Enterprise Desktop, SLES, tcpdump.

Our Vigil@nce team determined that the severity of this computer threat bulletin is medium.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this computer threat.

Solutions for this threat

tcpdump: version 4.9.3.
The version 4.9.3 is fixed:
  http://www.tcpdump.org/

Apple macOS: version 10.13.6-2019-007.
The version 10.13.6-2019-007 is fixed:
  https://support.apple.com/

Apple macOS: version 10.14.6-2019-002.
The version 10.14.6-2019-002 is fixed:
  https://support.apple.com/

Apple macOS: version 10.15.2.
The version 10.15.2 is fixed:
  https://support.apple.com/

Debian 8: new tcpdump packages.
New packages are available:
  Debian 8: tcpdump 4.9.3-1~deb8u1

Debian 9/10: new tcpdump packages.
New packages are available:
  Debian 9: tcpdump 4.9.3-1~deb9u1
  Debian 10: tcpdump 4.9.3-1~deb10u1

F5 BIG-IP: solution for tcpdump.
The solution is indicated in information sources.

Fedora: new tcpdump packages.
New packages are available:
  Fedora 29: tcpdump 4.9.3-1.fc29
  Fedora 30: tcpdump 4.9.3-1.fc30
  Fedora 31: tcpdump 4.9.3-1.fc31

openSUSE Leap 15: new tcpdump packages (21/10/2019).
New packages are available:
  openSUSE Leap 15.0: tcpdump 4.9.2-lp150.10.1
  openSUSE Leap 15.1: tcpdump 4.9.2-lp151.4.6.1

Slackware: new tcpdump packages.
New packages are available:
  Slackware 14.0: tcpdump 4.9.3-*-1_slack14.0
  Slackware 14.1: tcpdump 4.9.3-*-1_slack14.1
  Slackware 14.2: tcpdump 4.9.3-*-1_slack14.2

SUSE LE 11: new tcpdump packages.
New packages are available:
  SUSE LE 11 SP3: tcpdump 3.9.8-1.30.13.1
  SUSE LE 11 SP4: tcpdump 3.9.8-1.30.13.1

SUSE LE 15: new tcpdump packages (16/10/2019).
New packages are available:
  SUSE LE 15 RTM: tcpdump 4.9.2-3.9.1
  SUSE LE 15 SP1: tcpdump 4.9.2-3.9.1
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a software vulnerability announce. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.