Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 679290 (CVE-2018-19519) - net-analyzer/tcpdump: stack-based buffer overread in the print_prefix function of print-hncp.c
Summary: net-analyzer/tcpdump: stack-based buffer overread in the print_prefix functio...
Status: IN_PROGRESS
Alias: CVE-2018-19519
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/zyingp/temp/blob/m...
Whiteboard: C3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-03-03 00:36 UTC by D'juan McDonald (domhnall)
Modified: 2019-06-14 14:34 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description D'juan McDonald (domhnall) 2019-03-03 00:36:50 UTC
(https://nvd.nist.gov/vuln/detail/CVE-2018-19519):

In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.



Gentoo Security Padawan
(domhnall)
Comment 1 Agostino Sarubbo gentoo-dev 2019-03-03 08:13:15 UTC
Hello D'juan,

thanks for the report. Unless is stated that there is a RCE, since it is a read overflow, I'd set the rating to 3.
Thanks
Comment 2 D'juan McDonald (domhnall) 2019-06-14 14:34:05 UTC
Upstream patch: https://github.com/the-tcpdump-group/tcpdump/commit/511915bef7e4de2f31b8d9f581b4a44b0cfbcf53

" If decode_prefix6() returns a negative number, don't print buf.

If it returns a negative number, it hasn't necessarily filled in buf, so
just return immediately; this is similar to the IPv4 code path, wherein
we just return a negative number, and print nothing, on an error.

This should fix GitHub issue #763."