This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
2dc764fa-40c0-11dc-aeac-02e0185f8d72 | FreeBSD -- Buffer overflow in tcpdump(1)Problem Description:An un-checked return value in the BGP dissector code can result in an integer overflow. This value is used in subsequent buffer management operations, resulting in a stack based buffer overflow under certain circumstances. Impact:By crafting malicious BGP packets, an attacker could exploit this vulnerability to execute code or crash the tcpdump process on the target system. This code would be executed in the context of the user running tcpdump(1). It should be noted that tcpdump(1) requires privileges in order to open live network interfaces. Workaround:No workaround is available. Discovery 2007-08-01 Entry 2007-08-02 Modified 2016-08-09 tcpdump < 3.9.6 FreeBSD ge 6.2 lt 6.2_7 ge 6.1 lt 6.1_19 ge 5.5 lt 5.5_15 CVE-2007-3798 SA-07:06.tcpdump |