Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-2155
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-24 Mar, 2015 | 17:59
Updated At-12 Apr, 2025 | 10:46

The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Debian GNU/Linux
debian
>>debian_linux>>7.0
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>8.0
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>21
cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>13.1
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
openSUSE
opensuse
>>opensuse>>13.2
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
Oracle Corporation
oracle
>>solaris>>11.2
cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
tcpdump & libpcap
tcpdump
>>tcpdump>>Versions up to 4.7.0(inclusive)
cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://advisories.mageia.org/MGASA-2015-0114.htmlcve@mitre.org
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.htmlcve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.htmlcve@mitre.org
Third Party Advisory
http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.htmlcve@mitre.org
Patch
Third Party Advisory
VDB Entry
http://www.debian.org/security/2015/dsa-3193cve@mitre.org
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125cve@mitre.org
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:182cve@mitre.org
Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlcve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/534829/100/0/threadedcve@mitre.org
N/A
http://www.securityfocus.com/bid/73021cve@mitre.org
N/A
http://www.securitytracker.com/id/1031937cve@mitre.org
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-2580-1cve@mitre.org
N/A
https://access.redhat.com/errata/RHSA-2017:1871cve@mitre.org
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1201798cve@mitre.org
Issue Tracking
Third Party Advisory
VDB Entry
https://security.gentoo.org/glsa/201510-04cve@mitre.org
N/A
http://advisories.mageia.org/MGASA-2015-0114.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153834.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2015-03/msg00084.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://packetstormsecurity.com/files/130730/tcpdump-Denial-Of-Service-Code-Execution.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
VDB Entry
http://www.debian.org/security/2015/dsa-3193af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:125af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2015:182af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/534829/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/73021af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1031937af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/USN-2580-1af854a3a-2127-422b-91ae-364da2661108
N/A
https://access.redhat.com/errata/RHSA-2017:1871af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugzilla.redhat.com/show_bug.cgi?id=1201798af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Third Party Advisory
VDB Entry
https://security.gentoo.org/glsa/201510-04af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found