VYPR
Unrated severityNVD Advisory· Published Nov 20, 2014· Updated May 6, 2026

CVE-2014-8769

CVE-2014-8769

Description

tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.

Affected products

23
  • Red Hat/Tcpdump23 versions
    cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*+ 22 more
    • cpe:2.3:a:redhat:tcpdump:3.9.7:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.8:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.1:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:4.6.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.8.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.2:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.3:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.4:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.5:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:tcpdump:3.9.6:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

14

News mentions

0

No linked articles in our index yet.