7.5
CVSSv2

CVE-2017-12902

Published: 14/09/2017 Updated: 23/10/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Zephyr parser in tcpdump prior to 4.9.2 has a buffer over-read in print-zephyr.c, several functions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump

debian debian linux 9.0

debian debian linux 10.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.6

redhat enterprise linux server aus 7.7

Vendor Advisories

Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...
Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code For the oldstable distribution (jessie), these problems have been fixed in version 492-1~deb8u1 For the stable distribution (stretch), these proble ...
The Zephyr parser in tcpdump before 492 has a buffer over-read in print-zephyrc, several functions ...
An out-of-bounds read vulnerability was discovered in tcpdump's handling of Zephyr in tcpdump <= 491 An attacker could craft a malicious pcap file or send specially crafted packets to the network that would cause tcpdump to crash while processing the packet data ...