Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 679290 (CVE-2018-19519)

Summary: <net-analyzer/tcpdump-4.9.3: stack-based buffer overread in the print_prefix function of print-hncp.c (CVE-2018-19519)
Product: Gentoo Security Reporter: D'juan McDonald (domhnall) <flopwiki>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: netmon
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/zyingp/temp/blob/master/tcpdump.md
See Also: https://github.com/the-tcpdump-group/tcpdump/issues/763
Whiteboard: C3 [noglsa cve]
Package list:
Runtime testing required: ---

Description D'juan McDonald (domhnall) 2019-03-03 00:36:50 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2018-19519):

In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.



Gentoo Security Padawan
(domhnall)
Comment 1 Agostino Sarubbo gentoo-dev 2019-03-03 08:13:15 UTC
Hello D'juan,

thanks for the report. Unless is stated that there is a RCE, since it is a read overflow, I'd set the rating to 3.
Thanks
Comment 2 D'juan McDonald (domhnall) 2019-06-14 14:34:05 UTC
Upstream patch: https://github.com/the-tcpdump-group/tcpdump/commit/511915bef7e4de2f31b8d9f581b4a44b0cfbcf53

" If decode_prefix6() returns a negative number, don't print buf.

If it returns a negative number, it hasn't necessarily filled in buf, so
just return immediately; this is similar to the IPv4 code path, wherein
we just return a negative number, and print nothing, on an error.

This should fix GitHub issue #763."
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-19 04:11:53 UTC
Note that tree is now clean.