Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:EFE6D311584EBF4EE4D52202FC38B20C
HistoryApr 21, 2022 - 12:00 a.m.

USN-5331-1: tcpdump vulnerabilities | Cloud Foundry

2022-04-2100:00:00
Cloud Foundry
www.cloudfoundry.org
16
tcpdump
vulnerabilities
canonical ubuntu
cloud foundry
denial of service
arbitrary code
cve-2018-16301
cve-2020-8037
cf deployment
xenial stemcells

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

78.8%

Severity

Low

Vendor

Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 16.04

Description

It was discovered that tcpdump incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2018-16301) It was discovered that tcpdump incorrectly handled certain captured data. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-8037)

CVEs contained in this USN include: CVE-2018-16301, CVE-2020-8037.

Affected Cloud Foundry Products and Versions

Severity is low unless otherwise noted.

  • CF Deployment
    • All versions with Xenial Stemcells prior to 621.224

Mitigation

Users of affected products are strongly encouraged to follow the mitigations below. The Cloud Foundry project recommends upgrading the following releases:

  • CF Deployment
    • For all versions, upgrade Xenial Stemcells to 621.224 or greater

References

History

2022-04-21: Initial vulnerability report published.

Affected configurations

Vulners
Node
cloudfoundrycf-deploymentRange<621.224
VendorProductVersionCPE
cloudfoundrycf-deployment*cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

78.8%