
Cloud Vulnerability DB
A community-led vulnerabilities database
The SMB protocol decoder in tcpdump version 4.99.3 contains a vulnerability (CVE-2023-1801) that can perform an out-of-bounds write when decoding a crafted network packet. This vulnerability was discovered in early 2023 and affects tcpdump installations prior to version 4.99.4 (Debian Tracker).
The vulnerability exists in the SMB protocol decoder functionality of tcpdump. When processing specially crafted network packets, the decoder can perform an out-of-bounds write operation, which could lead to memory corruption. The issue was fixed in tcpdump version 4.99.4 through improved input validation (Debian Tracker).
An attacker in a privileged network position may be able to execute arbitrary code by exploiting this vulnerability through sending specially crafted network packets (Apple Security).
The vulnerability has been fixed in tcpdump version 4.99.4 and later. Users are advised to upgrade to the patched version. For Debian-based systems, fixed versions are available in the sid and trixie releases. The fix was implemented through commits 7578e1c and 03c037b in the tcpdump repository (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."