{"id":"CVE-2018-14880","details":"The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().","modified":"2026-05-15T12:03:27.762563870Z","published":"2019-10-03T16:15:12.210Z","related":["SUSE-SU-2019:2674-1","SUSE-SU-2020:3360-1","openSUSE-SU-2019:2344-1","openSUSE-SU-2019:2348-1","openSUSE-SU-2024:11425-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"apple:mac_os_x","extracted_events":[{"fixed":"10.15.2"}],"cpes":["cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"debian:debian_linux","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"},{"last_affected":"10.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_access_policy_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_advanced_firewall_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_analytics","cpes":["cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_application_acceleration_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_application_security_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_domain_name_system","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_edge_gateway","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_fraud_protection_service","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_global_traffic_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_link_controller","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_local_traffic_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_policy_enforcement_manager","extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}],"cpes":["cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:big-ip_webaccelerator","cpes":["cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*"],"extracted_events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"},{"introduced":"12.1.0"},{"last_affected":"12.1.5"},{"introduced":"13.1.0"},{"last_affected":"13.1.3"},{"introduced":"14.0.0"},{"last_affected":"14.1.2"},{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"source":"CPE_FIELD","vendor_product":"f5:big-iq_centralized_management","extracted_events":[{"introduced":"5.2.0"},{"last_affected":"5.4.0"},{"introduced":"6.0.0"},{"last_affected":"6.1.0"},{"last_affected":"7.0.0"}],"cpes":["cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*","cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:enterprise_manager","cpes":["cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"3.1.1"}]},{"source":"CPE_FIELD","vendor_product":"f5:iworkflow","extracted_events":[{"last_affected":"2.3.0"}],"cpes":["cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"f5:traffix_signaling_delivery_controller","extracted_events":[{"introduced":"5.0.0"},{"last_affected":"5.1.0"}],"cpes":["cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"fedoraproject:fedora","cpes":["cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"],"extracted_events":[{"last_affected":"29"},{"last_affected":"30"},{"last_affected":"31"}]},{"source":"CPE_FIELD","vendor_product":"opensuse:leap","extracted_events":[{"last_affected":"15.0"},{"last_affected":"15.1"}],"cpes":["cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"]},{"source":"CPE_FIELD","vendor_product":"redhat:enterprise_linux","extracted_events":[{"last_affected":"7.0"},{"last_affected":"8.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K56551263?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"WEB","url":"https://usn.ubuntu.com/4252-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/4252-2/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2019/Dec/26"},{"type":"ADVISORY","url":"https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Dec/23"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Oct/28"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200120-0001/"},{"type":"ADVISORY","url":"https://support.apple.com/kb/HT210788"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4547"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/commit/e01c9bf76740802025c9328901b55ee4a0c49ed6"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}