ID CVE-2001-1279
Summary Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
References
Vulnerable Configurations
  • cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-09-2008 - 19:10)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
redhat via4
advisories
rhsa
id RHSA-2001:089
refmap via4
bid 3065
caldera CSSA-2002-025.0
cert-vn VU#797201
conectiva CLA-2002:480
freebsd FreeBSD-SA-01:48
mandrake MDKSA-2002:032
xf tcpdump-afs-rpc-bo(7006)
Last major update 10-09-2008 - 19:10
Published 17-07-2001 - 04:00
Last modified 10-09-2008 - 19:10
Back to Top