{"id":"CVE-2019-1010220","details":"tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: \"ND_PRINT((ndo, \"%s\", buf));\", in function named \"print_prefix\", in \"print-hncp.c\". The attack vector is: The victim must open a specially crafted pcap file.","modified":"2026-04-10T04:13:40.527523Z","published":"2019-07-22T18:15:11.027Z","related":["SUSE-SU-2019:2087-1","SUSE-SU-2019:2088-1","SUSE-SU-2019:2674-1","SUSE-SU-2020:3360-1","openSUSE-SU-2019:1964-1","openSUSE-SU-2019:2344-1","openSUSE-SU-2019:2348-1","openSUSE-SU-2024:11425-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNYXF3IY2X65IOD422SA6EQUULSGW7FN/"},{"type":"WEB","url":"https://usn.ubuntu.com/4252-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/4252-2/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00065.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/62XY42U6HY3H2APR5EHNWCZ7SAQNMMJN/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R2UDPOSGVJQIYC33SQBXMDXHH4QDSDMU/"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9.2/print-hncp.c"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/blob/master/print-hncp.c"},{"type":"FIX","url":"https://github.com/the-tcpdump-group/tcpdump/commits/master/print-hncp.c"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/the-tcpdump-group/tcpdump","events":[{"introduced":"0"},{"last_affected":"dda68e7bd631451189152e91e7d3a93d56994a95"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.9.2"}]}}],"versions":["tcpdump-3.5.1","tcpdump-3.6.1","tcpdump-3.7.1","tcpdump-3.8-bp","tcpdump-4.5.0","tcpdump-4.6.0","tcpdump-4.6.0-bp","tcpdump-4.7.0-bp","tcpdump-4.9.0","tcpdump-4.9.0-bp","tcpdump-4.9.1","tcpdump-4.9.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-1010220.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}]}