9.8
CVSSv3

CVE-2017-13011

Published: 14/09/2017 Updated: 17/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Several protocol parsers in tcpdump prior to 4.9.2 could cause a buffer overflow in util-print.c:bittok2str_internal().

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tcpdump tcpdump

Vendor Advisories

Several security issues were fixed in tcpdump ...
Several security issues were fixed in tcpdump ...
Several vulnerabilities have been discovered in tcpdump, a command-line network traffic analyzer These vulnerabilities might result in denial of service or, potentially, execution of arbitrary code For the oldstable distribution (jessie), these problems have been fixed in version 492-1~deb8u1 For the stable distribution (stretch), these proble ...
A vulnerability was found in tcpdump's verbose printing of packet data A crafted pcap file or specially crafted network traffic could cause tcpdump to write out of bounds in the BSS segment, potentially causing tcpdump to display truncated or incorrectly decoded fields or crash with a segmentation violation This does not affect tcpdump when used ...
An out-of-bounds write vulnerability was discovered in tcpdump's parsers when calling bittok2str_internal An attacker could craft a malicious pcap file or send specially crafted packets to the network that would cause tcpdump to crash or possibly execute arbitrary code while processing the packet data ...