Vulnerability Details : CVE-2001-1279
Buffer overflow in print-rx.c of tcpdump 3.x (probably 3.6x) allows remote attackers to cause a denial of service and possibly execute arbitrary code via AFS RPC packets with invalid lengths that trigger an integer signedness error, a different vulnerability than CVE-2000-1026.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2001-1279
Probability of exploitation activity in the next 30 days: 19.39%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 96 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1279
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-1279
-
http://www.kb.cert.org/vuls/id/797201
Third Party Advisory;US Government Resource
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-025.0.txt
-
http://www.redhat.com/support/errata/RHSA-2001-089.html
Patch;Vendor Advisory
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-032.php
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000480
-
http://www.iss.net/security_center/static/7006.php
-
http://www.securityfocus.com/bid/3065
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:48.tcpdump.asc
Products affected by CVE-2001-1279
- cpe:2.3:a:lbl:tcpdump:3.6.2:*:*:*:*:*:*:*