The command-line argument parser in tcpdump before 4.9.3 has a buffer overflow in tcpdump.c:get_next_file().
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00050.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00053.html
http://seclists.org/fulldisclosure/2019/Dec/26
https://github.com/the-tcpdump-group/tcpdump/blob/tcpdump-4.9/CHANGES
https://github.com/the-tcpdump-group/tcpdump/commit/9ba91381954ad325ea4fd26b9c65a8bd9a2a85b6
https://lists.debian.org/debian-lts-announce/2019/10/msg00015.html
https://seclists.org/bugtraq/2019/Dec/23
https://seclists.org/bugtraq/2019/Oct/28
https://security.netapp.com/advisory/ntap-20200120-0001/
https://support.apple.com/kb/HT210788
https://support.f5.com/csp/article/K51512510?utm_source=f5support&utm_medium=RSS
Source: MITRE
Published: 2019-10-03
Updated: 2020-01-20
Type: CWE-120
Base Score: 5.1
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 4.9
Severity: MEDIUM
Base Score: 7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1
Severity: HIGH