{"id":"CVE-2018-16301","details":"The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.","modified":"2026-03-12T22:46:17.148178Z","published":"2019-10-03T16:15:12.693Z","related":["MGASA-2019-0297","SUSE-SU-2019:14191-1","SUSE-SU-2019:2669-1","SUSE-SU-2019:2673-1","SUSE-SU-2019:2674-1","SUSE-SU-2020:3360-1","SUSE-SU-2022:0505-1","SUSE-SU-2022:0774-1","SUSE-SU-2022:14890-1","openSUSE-SU-2019:2343-1","openSUSE-SU-2019:2344-1","openSUSE-SU-2019:2345-1","openSUSE-SU-2019:2348-1","openSUSE-SU-2022:0774-1","openSUSE-SU-2024:10969-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/commit/ad7c25bc0decf96dc7768c9e903734d38528b1bd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"fixed":"f736ac0bc2009892b73e06d63eacbda6849deeee"},{"fixed":"ad7c25bc0decf96dc7768c9e903734d38528b1bd"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.99.0"}]}}],"versions":["tcpdump-3.5.1","tcpdump-3.6.1","tcpdump-3.7.1","tcpdump-3.8-bp","tcpdump-4.5.0","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.7.0-bp","tcpdump-4.9.0-bp"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-16301.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}