"value":"The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-190 integer overflow or wraparound"
}
]
},
{
"description":[
{
"lang":"eng",
"value":"CWE-787 out-of-bounds write"
}
]
}
]
},
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"The Tcpdump Group",
"product":{
"product_data":[
{
"product_name":"tcpdump",
"version":{
"version_data":[
{
"version_affected":"<",
"version_value":"4.99.0"
}
]
}
}
]
}
}
]
}
},
"credit":[
{
"lang":"eng",
"value":"Include Security and Mozilla Secure Open Source program"