Tcpdump.Print.SL.C.Sliplink.Print.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against an Buffer Overflow vulnerability in tcpdump.
The vulnerability is caused by an error in print-sl.c when the vulnerable software parses a malformed packet. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted packet.

affected-products-logoAffected Products

tcpdump 4.9.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Upgrade to the latest version, available from the web site.
http://www.tcpdump.org/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)