CVE-2018-14467

7.5 HIGH

📋 TL;DR

This vulnerability in tcpdump's BGP parser allows attackers to cause a buffer over-read when processing specially crafted BGP packets. Systems running vulnerable versions of tcpdump that process BGP traffic are affected, potentially leading to information disclosure or denial of service.

💻 Affected Systems

Products:
  • tcpdump
Versions: All versions before 4.9.3
Operating Systems: All operating systems running vulnerable tcpdump versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when tcpdump processes BGP packets (using -B or analyzing BGP traffic).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though this is unlikely given the nature of buffer over-read vulnerabilities.

🟠

Likely Case

Denial of service (tcpdump crash) or information disclosure (reading beyond buffer boundaries).

🟢

If Mitigated

Minimal impact if tcpdump is not processing BGP traffic or is running with limited privileges.

🌐 Internet-Facing: MEDIUM - Only affects systems where tcpdump is actively monitoring BGP traffic from untrusted sources.
🏢 Internal Only: LOW - Requires specific BGP traffic processing; most internal uses of tcpdump won't trigger this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted BGP packets to a system where tcpdump is monitoring network traffic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.3 and later

Vendor Advisory: https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES

Restart Required: No

Instructions:

1. Update tcpdump to version 4.9.3 or later using your package manager. 2. For Linux: 'sudo apt update && sudo apt upgrade tcpdump' (Debian/Ubuntu) or 'sudo yum update tcpdump' (RHEL/CentOS). 3. Verify installation with 'tcpdump --version'.

🔧 Temporary Workarounds

Disable BGP packet processing

all

Avoid using tcpdump with BGP packet analysis capabilities

Avoid using '-B' flag or analyzing BGP protocol traffic

Run tcpdump with reduced privileges

linux

Limit potential impact by running tcpdump as non-root user

sudo -u nobody tcpdump [options]

🧯 If You Can't Patch

  • Restrict network access to systems running vulnerable tcpdump versions
  • Monitor for crashes or abnormal behavior in tcpdump processes

🔍 How to Verify

Check if Vulnerable:

Run 'tcpdump --version' and check if version is earlier than 4.9.3

Check Version:

tcpdump --version | head -1

Verify Fix Applied:

Confirm tcpdump version is 4.9.3 or later with 'tcpdump --version | head -1'

📡 Detection & Monitoring

Log Indicators:

  • tcpdump segmentation faults or crashes
  • unexpected termination of tcpdump processes

Network Indicators:

  • Malformed BGP packets targeting systems running tcpdump

SIEM Query:

process_name="tcpdump" AND (event_type="crash" OR exit_code="139")

🔗 References

📤 Share & Export