CVE-2014-8769

Publication date 20 November 2014

Last updated 24 July 2024


Ubuntu priority

tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.

Status

Package Ubuntu Release Status
tcpdump 14.10 utopic
Fixed 4.6.2-1ubuntu1.1
14.04 LTS trusty
Fixed 4.5.1-2ubuntu1.1
12.04 LTS precise
Fixed 4.2.1-1ubuntu2.1
10.04 LTS lucid
Fixed 4.0.0-6ubuntu3.1

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
tcpdump

References

Related Ubuntu Security Notices (USN)

    • USN-2433-1
    • tcpdump vulnerabilities
    • 4 December 2014

Other references