7.5
CVSSv3

CVE-2017-11108

Published: 08/07/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

tcpdump 4.9.0 allows remote malicious users to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data. The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol.

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump 4.9.0

Vendor Advisories

Debian Bug report logs - #867718 CVE-2017-11108 Package: tcpdump; Maintainer for tcpdump is Romain Francoise <rfrancoise@debianorg>; Source for tcpdump is src:tcpdump (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 8 Jul 2017 21:27:02 UTC Severity: important Tags: fixed-upstream, ...
Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...
Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code For the oldstable distribution (jessie), these problems have been fixed in version 492-1~deb8u1 For the stable distribution (stretch), these proble ...
tcpdump 490 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packet data The crash occurs in the EXTRACT_16BITS function, called from the stp_print function for the Spanning Tree Protocol ...