CVE-2018-14465
📋 TL;DR
CVE-2018-14465 is a buffer over-read vulnerability in the RSVP parser of tcpdump, a network packet analyzer. It allows attackers to cause denial-of-service (DoS) or potentially leak sensitive memory information by sending specially crafted RSVP packets. This affects users running vulnerable versions of tcpdump on systems where it processes untrusted network traffic.
💻 Affected Systems
- tcpdump
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
Fedora by Fedoraproject
Leap by Opensuse
Leap by Opensuse
Tcpdump by Tcpdump
Tcpdump by Tcpdump
⚠️ Risk & Real-World Impact
Worst Case
Exploitation could lead to remote code execution (RCE) or system crashes, compromising the host running tcpdump.
Likely Case
Most probable impact is denial-of-service (DoS) through application crashes or memory corruption, disrupting network monitoring.
If Mitigated
With proper controls like network segmentation and minimal privileges, impact is limited to DoS on the tcpdump process only.
🎯 Exploit Status
Exploitation involves sending crafted RSVP packets; public proof-of-concept code exists, making attacks feasible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: tcpdump 4.9.3 and later
Vendor Advisory: https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
Restart Required: No
Instructions:
1. Update tcpdump to version 4.9.3 or later using your package manager. 2. For Linux, run: sudo apt-get update && sudo apt-get install tcpdump (or use yum/dnf for RHEL-based systems). 3. Verify the update with: tcpdump --version.
🔧 Temporary Workarounds
Disable RSVP parsing in tcpdump
linuxUse tcpdump filters to avoid parsing RSVP packets, reducing exposure.
tcpdump not rsvp
Restrict network access
allLimit tcpdump usage to trusted networks or interfaces to prevent malicious packet injection.
tcpdump -i eth0 (specify trusted interface)
🧯 If You Can't Patch
- Isolate tcpdump to a segmented network with strict ingress/egress controls to block untrusted RSVP traffic.
- Run tcpdump with minimal privileges (e.g., non-root user) and monitor for crashes or unusual activity as an early warning.
🔍 How to Verify
Check if Vulnerable:
Run: tcpdump --version | grep -E '^tcpdump version' and check if version is below 4.9.3.
Check Version:
tcpdump --version
Verify Fix Applied:
After patching, confirm version is 4.9.3 or higher with: tcpdump --version.
📡 Detection & Monitoring
Log Indicators:
- Look for tcpdump crash logs or core dumps in system logs (e.g., /var/log/syslog).
Network Indicators:
- Monitor for unusual RSVP packet spikes or malformed network traffic targeting tcpdump ports.
SIEM Query:
Example: 'process:tcpdump AND event_type:crash' or 'network_traffic:protocol:rsvp AND size:anomalous'
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Oct/28
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://usn.ubuntu.com/4252-1/
- https://usn.ubuntu.com/4252-2/
- https://www.debian.org/security/2019/dsa-4547
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
- http://seclists.org/fulldisclosure/2019/Dec/26
- https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
- https://github.com/the-tcpdump-group/tcpdump/commit/bea2686c296b79609060a104cc139810785b0739
- https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/
- https://seclists.org/bugtraq/2019/Dec/23
- https://seclists.org/bugtraq/2019/Oct/28
- https://security.netapp.com/advisory/ntap-20200120-0001/
- https://support.apple.com/kb/HT210788
- https://usn.ubuntu.com/4252-1/
- https://usn.ubuntu.com/4252-2/
- https://www.debian.org/security/2019/dsa-4547