| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2018-10105
Vulnerability Database
CVE-2018-10105
Base Score
CRITICAL
9.8
CVE-2018-10105
tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).
Vector
NETWORK
Published By
cve@mitre.org
Published Date
Oct 03, 2019, 16:15
Weakness Type (CWE)
:
CWE-20
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
9.8
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
http://seclists.org/fulldisclosure/2019/Dec/26
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Oct/28
https://security.netapp.com/advisory/ntap-20200120-0001/
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K44551633?utm_source=f5support&%3Butm_medium=RSS
https://usn.ubuntu.com/4252-1/
https://usn.ubuntu.com/4252-2/
https://www.debian.org/security/2019/dsa-4547
Base Score
CRITICAL
9.8
Weakness Type (CWE)
:
CWE-20
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
9.8
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH