9.8
CVSSv3

CVE-2017-12900

Published: 14/09/2017 Updated: 03/10/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Several protocol parsers in tcpdump prior to 4.9.2 could cause a buffer over-read in util-print.c:tok2strbuf().

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump

Vendor Advisories

Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...
Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code For the oldstable distribution (jessie), these problems have been fixed in version 492-1~deb8u1 For the stable distribution (stretch), these proble ...
Several protocol parsers in tcpdump before 492 could cause a buffer over-read in util-printc:tok2strbuf() ...
An out-of-bounds read vulnerability was discovered in tcpdump's parsers when calling tok2strbuf in tcpdump <= 491 An attacker could craft a malicious pcap file or send specially crafted packets to the network that would cause tcpdump to crash while processing the packet data ...