It was discovered that tcpdump incorrectly handled printing certain packets. A remote attacker could use this issue to cause tcpdump to crash, resulting in a denial of service, or possibly execute arbitrary code.
In the default installation, attackers would be isolated by the tcpdump AppArmor profile.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.5.1-2ubuntu1.2", "binary_name": "tcpdump" } ] }
{ "ecosystem": "Ubuntu:14.04:LTS", "cves": [ { "severity": [ { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2015-0261" }, { "severity": [ { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2015-2153" }, { "severity": [ { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2015-2154" }, { "severity": [ { "type": "Ubuntu", "score": "medium" } ], "id": "CVE-2015-2155" } ] }