The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2018-14463 - High Severity Vulnerability
Vulnerable Library - platform_external_tcpdumpandroid-mainline-12.0.0_r17
Library home page: https://github.com/aosp-mirror/platform_external_tcpdump.git
Found in HEAD commit: 8bc69f757d775a894d925b18a07be1dcc294773c
Found in base branch: master
Vulnerable Source Files (1)
/print-vrrp.c
Vulnerability Details
The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print() for VRRP version 2, a different vulnerability than CVE-2019-15167.
Publish Date: 2019-10-03
URL: CVE-2018-14463
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14463
Release Date: 2019-10-03
Fix Resolution: 4.9.3
Step up your Open Source Security Game with Mend here