VYPR
Unrated severityNVD Advisory· Published Nov 20, 2014· Updated May 6, 2026

CVE-2014-8767

CVE-2014-8767

Description

Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.

Affected products

17
  • Red Hat/Tcpdump17 versions
    cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*+ 16 more
    • cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.2:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.