{"id":"USN-2433-1","summary":"tcpdump vulnerabilities","details":"Steffen Bauch discovered that tcpdump incorrectly handled printing OSLR\npackets. A remote attacker could use this issue to cause tcpdump to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2014-8767)\n\nSteffen Bauch discovered that tcpdump incorrectly handled printing GeoNet\npackets. A remote attacker could use this issue to cause tcpdump to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only applied to Ubuntu 14.04 LTS and Ubuntu 14.10. (CVE-2014-8768)\n\nSteffen Bauch discovered that tcpdump incorrectly handled printing AODV\npackets. A remote attacker could use this issue to cause tcpdump to crash,\nresulting in a denial of service, reveal sensitive information, or possibly\nexecute arbitrary code. (CVE-2014-8769)\n\nIt was discovered that tcpdump incorrectly handled printing PPP packets. A\nremote attacker could use this issue to cause tcpdump to crash, resulting\nin a denial of service, or possibly execute arbitrary code.\n(CVE-2014-9140)\n\nIn the default installation, attackers would be isolated by the tcpdump\nAppArmor profile. ","modified":"2026-02-10T04:40:51Z","published":"2014-12-04T14:05:51Z","related":["UBUNTU-CVE-2014-8767","UBUNTU-CVE-2014-8768","UBUNTU-CVE-2014-8769","UBUNTU-CVE-2014-9140"],"upstream":["CVE-2014-8767","CVE-2014-8768","CVE-2014-8769","CVE-2014-9140","UBUNTU-CVE-2014-8767","UBUNTU-CVE-2014-8768","UBUNTU-CVE-2014-8769","UBUNTU-CVE-2014-9140"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2433-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8767"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8768"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-8769"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-9140"}],"affected":[{"package":{"name":"tcpdump","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/tcpdump@4.5.1-2ubuntu1.1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.5.1-2ubuntu1.1"}]}],"versions":["4.4.0-1ubuntu1","4.5.1-2ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"4.5.1-2ubuntu1.1","binary_name":"tcpdump"}]},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-8767"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-8768"},{"severity":[{"score":"low","type":"Ubuntu"}],"id":"CVE-2014-8769"},{"severity":[{"score":"medium","type":"Ubuntu"}],"id":"CVE-2014-9140"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2433-1.json"}}],"schema_version":"1.7.3"}