Description
The Zephyr parser in tcpdump before 4.9.2 has a buffer over-read in print-zephyr.c, several functions.
References (8)
Core 8
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
https://security.gentoo.org/glsa/201709-23
Third Party Advisory x_refsource_confirm
https://support.apple.com/HT208221
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2017/dsa-3971
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1039307
Vendor Advisory x_refsource_confirm
http://www.tcpdump.org/tcpdump-changes.txt
Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/6ec0c6fa63412c7a07a5bcb790a529c3563b4173
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/the-tcpdump-group/tcpdump/commit/d17507ffa3e9742199b02a66aa940e79ababfa30
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHEA-2018:0705
Scores
CVSS v3
9.8
EPSS
0.0206
EPSS Percentile
84.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (7)
debian/debian_linux
9.0
debian/debian_linux
10.0
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_server_aus
7.6
redhat/enterprise_linux_server_aus
7.7
tcpdump/tcpdump
< 4.9.1
Published
Sep 14, 2017
Tracked Since
Feb 18, 2026